Sciweavers

1893 search results - page 315 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
ICSE
2005
IEEE-ACM
14 years 8 months ago
Explicit assumptions enrich architectural models
Design for change is a well-known adagium in software engineering. We separate concerns, employ well-designed interfaces, and the like to ease evolution of the systems we build. W...
Patricia Lago, Hans van Vliet
IDTRUST
2009
ACM
14 years 2 months ago
Palantir: a framework for collaborative incident response and investigation
Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we ar...
Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Mic...
IWIA
2006
IEEE
14 years 2 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
STEP
2005
IEEE
14 years 1 months ago
Tool Support for Continuous Quality Assessment
Maintenance costs make up the bulk of the total life cycle costs of a software system. Besides organizational issues such as knowledge management and turnover, the longterm mainte...
Florian Deissenboeck, Markus Pizka, Tilman Seifert
WWW
2005
ACM
14 years 1 months ago
Hera presentation generator
Semantic Web Information Systems (SWIS) are Web Information Systems that use Semantic Web technologies. Hera is a modeldriven design methodology for SWIS. In Hera, models are repr...
Flavius Frasincar, Geert-Jan Houben, Peter Barna