Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
A logical database schema, e.g. a relational one, is an implementation of a speci cation, e.g. an entity-relationship diagram. Upcoming new data models and the necessity of seamle...
Software metrics are an essential means to assess software quality. For the assessment of software quality, typically sets of complementing metrics are used since individual metric...
Edith Werner, Jens Grabowski, Helmut Neukirchen, N...
Data and computations of a CAD system have been wrapped by a mediator system using CORBA's IIOP Protocol. This allows ad hoc declarative mediator queries to be translated into...
The design and development of complex software systems is a difficult task, and it is not easy to ensure the quality of a developed software. The paper presents an architectural ...