Survivability Using Adaptive Reconfigurable Systems
Significant advances have been made in reconfigurable computing device technology paving the path for fast, dynamically reconfigurable systems. The biggest challenge in the way of flexible adaptive computing is runtime reconfiguration. Many difficult issues are involved in runtime reconfiguration. S...
| Main Author: | Azween, Abdullah |
|---|---|
| Format: | Citation Index Journal |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/2600/ http://scholars.utp.edu.my/id/eprint/2600/1/20090114.pdf |
Similar Items
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008)
by: Azween, Abdullah
Published: (2008)
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008)
by: Azween, Abdullah
Published: (2008)
Survivable System by Critical Service Recovery
Model: Single Service Analysis
by: Irving , Paputungan, et al.
Published: (2009)
by: Irving , Paputungan, et al.
Published: (2009)
Modelling a survivable system through critical service recovery process
by: Azween, Abdullah, et al.
Published: (2008)
by: Azween, Abdullah, et al.
Published: (2008)
Specifying a recovery model for survivable system
by: Azween, Abdullah, et al.
Published: (2007)
by: Azween, Abdullah, et al.
Published: (2007)
High-level language and compiler for reconfigurable computing
by: Hiew,, FS, et al.
Published: (2004)
by: Hiew,, FS, et al.
Published: (2004)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Semantic-Based Grid Resource Discovery Systems
by: Mahamat Issa , Hassan, et al.
Published: (2010)
by: Mahamat Issa , Hassan, et al.
Published: (2010)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Rainfall-runoff modelling using adaptive neuro-fuzzy inference system
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
Induction machine diagnostic using adaptive neuro fuzzy inferencing system
by: Shukri, Mohamad, et al.
Published: (2004)
by: Shukri, Mohamad, et al.
Published: (2004)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
A Semantic Description and Registration Framework for Large Grid Resource Discovery Systems
by: Mahamat Issa , Hassan, et al.
Published: (2009)
by: Mahamat Issa , Hassan, et al.
Published: (2009)
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
by: Hassan, Mahamat. I, et al.
Published: (2010)
by: Hassan, Mahamat. I, et al.
Published: (2010)
Evaluating Neural Network Intrusion Detection Approaches Using Analytic Hierarchy Process
by: Ahmad, iftikhar, et al.
Published: (2010)
by: Ahmad, iftikhar, et al.
Published: (2010)
A Bio-Inspired Framework for Wireless Sensor Network Using Mobile Sensors
by: Ponnusamy , Vasaki, et al.
Published: (2010)
by: Ponnusamy , Vasaki, et al.
Published: (2010)
The design of an FPGA-based processor with reconfigurable processor execution structure for internet of things (IoT) applications
by: Kiat, Wei Pau
Published: (2018)
by: Kiat, Wei Pau
Published: (2018)
Evaluating Intrusion Detection Approaches Using a Multi-criteria Decision Making Technique
by: I. , Ahmad, et al.
Published: (2010)
by: I. , Ahmad, et al.
Published: (2010)
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
by: Ahmad, Iftikhar, et al.
Published: (2010)
by: Ahmad, Iftikhar, et al.
Published: (2010)
Biologically Inspired Object Recognition System
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
Immune Multi Agent System for Intrusion Prevention and Self healing System Implement a Non-Linear Classification
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Signal Noise Removal using Concurrent Algorithm
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2008)
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2008)
A BIOLOGICALLY INSPIRED OBJECT RECOGNITION SYSTEM
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
Remote to Local Attack Detection Using Supervised Neural Network
by: Iftikhar, Ahmad, et al.
Published: (2010)
by: Iftikhar, Ahmad, et al.
Published: (2010)
Biologically Inspired Signal Noise Elimination Using Human Ear Model with Concurrent Algorithm
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2008)
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2008)
Development knowledge management for adaptive hypermedia learning system
by: Abd. Halim, Shahliza, et al.
Published: (2005)
by: Abd. Halim, Shahliza, et al.
Published: (2005)
A simplified approach for computer-aided education of network reconfiguration in radial distribution systems
by: Prasad, K., et al.
Published: (2007)
by: Prasad, K., et al.
Published: (2007)
Empirical evaluation of mixed approach in adaptive hypermedia learning system
by: Haron, Norreen, et al.
Published: (2006)
by: Haron, Norreen, et al.
Published: (2006)
Predicting the survivability of links in an ad hoc network / Lim Vivi
by: Lim , Vivi
Published: (2006)
by: Lim , Vivi
Published: (2006)
Multi-Tiered Bio-Inspired Self-Healing Architectural
Paradigm for Software Systems
by: Azween, Abdullah, et al.
Published: (2009)
by: Azween, Abdullah, et al.
Published: (2009)
Energy Balancing Through Cluster Head Selection Using K-Theorem in Homogeneous Wireless Sensor Networks
by: Muhammad , Imran, et al.
by: Muhammad , Imran, et al.
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
Layered biologically inspired self-healing software system architecture
by: Azween, Abdullah, et al.
Published: (2008)
by: Azween, Abdullah, et al.
Published: (2008)
Hop-by-Hop Dynamic Addressing Based (H2-DAB) Routing Protocol for Underwater Wireless Sensor Networks
by: Muhammad , Ayaz, et al.
Published: (2009)
by: Muhammad , Ayaz, et al.
Published: (2009)
Biologically-Inspired Modeling of Filtering Noise in Signal Sound
by: Hammuzamer , Irwan, et al.
Published: (2009)
by: Hammuzamer , Irwan, et al.
Published: (2009)
A Proposed Model of Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer , Irwan, et al.
Published: (2009)
by: Hammuzamer , Irwan, et al.
Published: (2009)
A Proposed Application Model for a Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer, Irwan, et al.
Published: (2009)
by: Hammuzamer, Irwan, et al.
Published: (2009)
The Impact of Overclocking the CPU to the Genetic Algorithm
by: Ahmed , Hikmat, et al.
Published: (2009)
by: Ahmed , Hikmat, et al.
Published: (2009)
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
by: Muhammad, Ayaz, et al.
Published: (2009)
by: Muhammad, Ayaz, et al.
Published: (2009)
Similar Items
-
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008) -
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008) -
Survivable System by Critical Service Recovery
Model: Single Service Analysis
by: Irving , Paputungan, et al.
Published: (2009) -
Modelling a survivable system through critical service recovery process
by: Azween, Abdullah, et al.
Published: (2008) -
Specifying a recovery model for survivable system
by: Azween, Abdullah, et al.
Published: (2007)