Sciweavers

414 search results - page 10 / 83
» Analyzing and Designing of the Classroom Teaching System Bas...
Sort
View
KBSE
2005
IEEE
14 years 1 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 2 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
LADC
2007
Springer
14 years 1 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
HICSS
2005
IEEE
160views Biometrics» more  HICSS 2005»
14 years 1 months ago
Using Content and Process Scaffolds to Support Collaborative Discourse in Asynchronous Learning Networks
Discourse, a form of collaborative learning [44], is one of the most widely used methods of teaching and learning in the online environment. Particularly in large courses, discour...
I. Wong-Bushby, Starr Roxanne Hiltz, Michael Biebe...
WOSP
2005
ACM
14 years 1 months ago
Performance evaluation of UML software architectures with multiclass Queueing Network models
Software performance based on performance models can be applied at early phases of the software development cycle to characterize the quantitative behavior of software systems. We...
Simonetta Balsamo, Moreno Marzolla