Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
The integration of query languages and programming languages is still a central problem of database research. In particular, issues with respect to the impedance mismatch are of i...
In this work, we propose a framework for quantifying non-functional requirements (NFRs). This framework uses quality characteristics of the execution domain, application domain an...
BORM Object Behavior Analysis (BOBA) is a first stage in a process of object modeling which has proved successful in a wide number of applications. This paper discusses this metho...
We propose Tree Hash to reduce bucket overflow, which is one of the inherent problems in dynamic hash techniques. In this investigation, we dicuss how to improve efficien cy of Tre...