Sciweavers

1893 search results - page 315 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
ICSE
2005
IEEE-ACM
16 years 4 months ago
Explicit assumptions enrich architectural models
Design for change is a well-known adagium in software engineering. We separate concerns, employ well-designed interfaces, and the like to ease evolution of the systems we build. W...
Patricia Lago, Hans van Vliet
IDTRUST
2009
ACM
15 years 11 months ago
Palantir: a framework for collaborative incident response and investigation
Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we ar...
Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Mic...
IWIA
2006
IEEE
15 years 10 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
STEP
2005
IEEE
15 years 9 months ago
Tool Support for Continuous Quality Assessment
Maintenance costs make up the bulk of the total life cycle costs of a software system. Besides organizational issues such as knowledge management and turnover, the longterm mainte...
Florian Deissenboeck, Markus Pizka, Tilman Seifert
WWW
2005
ACM
15 years 9 months ago
Hera presentation generator
Semantic Web Information Systems (SWIS) are Web Information Systems that use Semantic Web technologies. Hera is a modeldriven design methodology for SWIS. In Hera, models are repr...
Flavius Frasincar, Geert-Jan Houben, Peter Barna