Sciweavers

544 search results - page 84 / 109
» A Logic Based Approach to the Static Analysis of Production ...
Sort
View
ISSA
2004
13 years 9 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
AIS
2007
Springer
13 years 8 months ago
Crafts praxis for critical wearables design
This paper treats the contemporary craft market as an under-researched resource for wearable computing, and investigates the alternative values and experiences that contemporary c...
Sarah Kettley
JSW
2007
102views more  JSW 2007»
13 years 8 months ago
Model-driven Engineering for Early QoS Validation of Component-based Software Systems
— Model-driven engineering (MDE) techniques are increasingly being used to address many of the development and operational lifecycle concerns of large-scale component-based syste...
James H. Hill, Aniruddha S. Gokhale
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 2 days ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
PROMISE
2010
13 years 2 months ago
Prediction of defect distribution based on project characteristics for proactive project management
As software has been pervasive and various software projects have been executed since the 1970s, software project management has played a significant role in software industry. Th...
Youngki Hong, Wondae Kim, Jeongsoo Joo