Sciweavers

374 search results - page 60 / 75
» Deployment automation with BLITZ
Sort
View
JCM
2007
177views more  JCM 2007»
13 years 8 months ago
Collision Free MAC Protocols for Wireless Ad Hoc Networks based on BIBD Architecture
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Pietro Camarda, Orazio Fiume
TSE
2008
89views more  TSE 2008»
13 years 8 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...
JUCS
2007
146views more  JUCS 2007»
13 years 8 months ago
Ontology and Grammar of the SOPHIE Choreography Conceptual Framework - An Ontological Model for Knowledge Management
: Ontologies have been recognized as a fundamental infrastructure for advanced approaches to Knowledge Management (KM) automation in SOA. Building services communicate with each ot...
Sinuhé Arroyo
KBS
2007
100views more  KBS 2007»
13 years 8 months ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
JCS
2002
103views more  JCS 2002»
13 years 8 months ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...