Sciweavers

2269 search results - page 341 / 454
» Behavioral Intrusion Detection
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
HADOF: defense against routing disruptions in mobile ad hoc networks
— HADOF is a set of mechanisms to defend against routing disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node, HADOF aims to ...
Wei Yu, Yan Sun, K. J. Ray Liu
ICSE
2009
IEEE-ACM
14 years 11 months ago
Do code clones matter?
Code cloning is not only assumed to inflate maintenance costs but also considered defect-prone as inconsistent changes to code duplicates can lead to unexpected behavior. Conseque...
Benjamin Hummel, Elmar Jürgens, Florian Deiss...
SIGSOFT
2008
ACM
14 years 10 months ago
Using assertions to help end-user programmers create dependable web macros
Web macros give web browser users ways to "program" tedious tasks, allowing those tasks to be repeated more quickly and reliably than when performed by hand. Web macros ...
Andhy Koesnandar, Sebastian G. Elbaum, Gregg Rothe...
RECOMB
2001
Springer
14 years 10 months ago
Analysis techniques for microarray time-series data
We address possible limitations of publicly available data sets of yeast gene expression. We study the predictability of known regulators via time-series analysis, and show that l...
Vladimir Filkov, Steven Skiena, Jizu Zhi
ITNG
2008
IEEE
14 years 4 months ago
A Framework for Agent-Based Trust Management in Online Auctions
Current electronic commerce applications such as online auction systems are not trustworthy due to a lack of effective trust management mechanisms. A trustworthy online auction sy...
Haiping Xu, Sol M. Shatz, Christopher K. Bates