Sciweavers

132 search results - page 12 / 27
» An empirical evaluation of undo mechanisms
Sort
View
ATAL
2005
Springer
14 years 2 months ago
Trusted kernel-based coalition formation
We define Trusted Kernel-based Coalition Formation as a novel extension to the traditional kernel-based coalition formation process which ensures agents choose the most reliable ...
Bastian Blankenburg, Rajdeep K. Dash, Sarvapali D....
IWINAC
2005
Springer
14 years 1 months ago
MEPIDS: Multi-Expression Programming for Intrusion Detection System
Abstract. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been ...
Crina Grosan, Ajith Abraham, Sang-Yong Han
IJWMC
2006
84views more  IJWMC 2006»
13 years 8 months ago
Resilient and energy efficient tracking in sensor networks
: We present a new distributed mechanism for tracking moving objects with a network of sensors. To track such objects efficiently and accurately, we need techniques that allow the ...
Maria Halkidi, Dimitris Papadopoulos, Vana Kaloger...
IJSEKE
2011
141views more  IJSEKE 2011»
12 years 12 months ago
Risk Assessment in Multi-disciplinary (Software+) Engineering Projects
Software systems in safety-critical industrial automation systems, such as power plants and steel mills, become increasingly large, complex, and distributed. For assessing risks, l...
Stefan Biffl, Thomas Moser, Dietmar Winkler
SIGMOD
2011
ACM
222views Database» more  SIGMOD 2011»
12 years 11 months ago
Data generation using declarative constraints
We study the problem of generating synthetic databases having declaratively specified characteristics. This problem is motivated by database system and application testing, data ...
Arvind Arasu, Raghav Kaushik, Jian Li