Sciweavers

308 search results - page 46 / 62
» An Agile Approach to a Legacy System
Sort
View
WWW
2009
ACM
14 years 7 months ago
Efficient application placement in a dynamic hosting platform
Web hosting providers are increasingly looking into dynamic hosting to reduce costs and improve the performance of their platforms. Instead of provisioning fixed resources to each...
Zakaria Al-Qudah, Hussein A. Alzoubi, Mark Allman,...
ACSAC
2005
IEEE
14 years 11 days ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
ICC
2007
IEEE
100views Communications» more  ICC 2007»
14 years 1 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
SEMWEB
2009
Springer
13 years 11 months ago
Reasoning about Resources and Hierarchical Tasks Using OWL and SWRL
Abstract. Military training and testing events are highly complex affairs, potentially involving dozens of legacy systems that need to interoperate in a meaningful way. There are s...
Daniel Elenius, David Martin, Reginald Ford, Grit ...
WWW
2004
ACM
14 years 7 months ago
Newsjunkie: providing personalized newsfeeds via analysis of information novelty
We present a principled methodology for filtering news stories by formal measures of information novelty, and show how the techniques can be used to custom-tailor newsfeeds based ...
Evgeniy Gabrilovich, Susan T. Dumais, Eric Horvitz