Sciweavers

1554 search results - page 265 / 311
» cases 2003
Sort
View
COMPSAC
2003
IEEE
15 years 3 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...
DATE
2003
IEEE
145views Hardware» more  DATE 2003»
15 years 3 months ago
Automated Bus Generation for Multiprocessor SoC Design
The performance of a system, especially a multiprocessor system, heavily depends upon the efficiency of its bus architecture. This paper presents a methodology to generate a custo...
Kyeong Keol Ryu, Vincent John Mooney
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 3 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
ICCAD
2003
IEEE
195views Hardware» more  ICCAD 2003»
15 years 3 months ago
Vectorless Analysis of Supply Noise Induced Delay Variation
The impact of power supply integrity on a design has become a critical issue, not only for functional verification, but also for performance verification. Traditional analysis has...
Sanjay Pant, David Blaauw, Vladimir Zolotov, Savit...
65
Voted
INFOCOM
2003
IEEE
15 years 2 months ago
Performance anomaly of 802.11b
— We analyze the performance of the IEEE 802.11b wireless local area networks. We have observed that when some mobile hosts use a lower bit rate than the others, the performance ...
Gilles Berger-Sabbatel, Franck Rousseau, Martin He...