Sciweavers

5009 search results - page 172 / 1002
» Value chain modelling using system dynamics
Sort
View
SIGSOFT
2011
ACM
14 years 10 months ago
Modeling a distributed intrusion detection system using collaborative building blocks
Developing complex distributed systems is a non-trivial task. It is even more difficult when the systems need to dynamically reconfigure the distributed functionalities or tasks...
Linda Ariani Gunawan, Michael Vogel, Frank Alexand...
ACSD
2010
IEEE
219views Hardware» more  ACSD 2010»
15 years 1 months ago
The Model Checking View to Clock Gating and Operand Isolation
Abstract--Clock gating and operand isolation are two techniques to reduce the power consumption in state-of-the-art hardware designs. Both approaches basically follow a two-step pr...
Jens Brandt, Klaus Schneider, Sumit Ahuja, Sandeep...
GECCO
2005
Springer
204views Optimization» more  GECCO 2005»
15 years 9 months ago
Modeling systems with internal state using evolino
Existing Recurrent Neural Networks (RNNs) are limited in their ability to model dynamical systems with nonlinearities and hidden internal states. Here we use our general framework...
Daan Wierstra, Faustino J. Gomez, Jürgen Schm...
ETRICS
2006
15 years 7 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
SBCCI
2003
ACM
135views VLSI» more  SBCCI 2003»
15 years 9 months ago
Modeling a Reconfigurable System for Computing the FFT in Place via Rewriting-Logic
The growing adoption of reconfigurable architectures opens new implementation alternatives and creates new design challenges. In the case of dynamically reconfigurable architectur...
Mauricio Ayala-Rincón, Rodrigo B. Nogueira,...