Sciweavers

1168 search results - page 165 / 234
» Influencing Software Usage
Sort
View
CSMR
1999
IEEE
14 years 15 hour ago
Impact of Function Pointers on the Call Graph
Maintenance activities are made more difficult when pointers are heavily used in source code: the programmer needs to build a mental model of memory locations and of the way they ...
Giuliano Antoniol, F. Calzolari, Paolo Tonella
WACC
1999
ACM
14 years 2 hour ago
Coordinating agent activities in knowledge discovery processes
Knowledge discovery in databases (KDD) is an increasingly widespread activity. KDD processes may entail the use of a large number of data manipulation and analysis techniques, and...
David Jensen, Yulin Dong, Barbara Staudt Lerner, E...
ICRE
1998
IEEE
13 years 12 months ago
Requirements Definition for Survivable Network Systems
Pervasive societal dependency on large-scale, unbounded network systems, the substantial risks of such dependency, and the growing sophistication of system intruders, have focused...
Richard C. Linger, Nancy R. Mead, Howard F. Lipson
ARC
2006
Springer
122views Hardware» more  ARC 2006»
13 years 11 months ago
UNITE: Uniform Hardware-Based Network Intrusion deTection Engine
Abstract. Current software implementations of network intrusion detection reach a maximum network connection speed of about 1Gbps (Gigabits per second). This paper analyses the Sno...
Sherif Yusuf, Wayne Luk, M. K. N. Szeto, William G...
ARCS
2006
Springer
13 years 11 months ago
Background Data Acquisition and Carrying: The BlueDACS Project
As an alternative to ad hoc wireless sensor networks, we propose to utilize the mobile devices that are carried by people who walk along the site on which the sensors are deployed....
Thomas Wieland, Martin Fenne, Benjamin Stöcke...