Sciweavers

20655 search results - page 3876 / 4131
» Exploring Software Systems
Sort
View
SADFE
2005
IEEE
15 years 8 months ago
Digital Evidence Search Kit
With the rapid development of electronic commerce and Internet technology, cyber crimes have become more and more common. There is a great need for automated software systems that...
K. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas C...
VISUALIZATION
2005
IEEE
15 years 8 months ago
Opening the Black Box - Data Driven Visualization of Neural Network
Arti cial neural networks are computer software or hardware models inspired by the structure and behavior of neurons in the human nervous system. As a powerful learning tool, incr...
Fan-Yin Tzeng, Kwan-Liu Ma
WCRE
2005
IEEE
15 years 8 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
WECWIS
2005
IEEE
141views ECommerce» more  WECWIS 2005»
15 years 8 months ago
An Adaptive Bilateral Negotiation Model for E-Commerce Settings
This paper studies adaptive bilateral negotiation between software agents in e-commerce environments. Specifically, we assume that the agents are self-interested, the environment...
Vidya Narayanan, Nicholas R. Jennings
WETICE
2005
IEEE
15 years 8 months ago
On P2P Collaboration Infrastructures
BSCW [8] and Groove [10] have become the two defacto standards for collaboration over the Internet. They offer a wealth of functionalities, support a variety of possible collabora...
Manfred Hauswirth, Ivana Podnar, Stefan Decker
« Prev « First page 3876 / 4131 Last » Next »