Sciweavers

1291 search results - page 189 / 259
» Intrusion Detection for Distributed Applications
Sort
View
120
Voted
ICSE
2008
IEEE-ACM
16 years 2 months ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...
129
Voted
EDOC
2007
IEEE
15 years 9 months ago
Modeling and Integrating Aspects into Component Architectures
Dependable software systems are difficult to develop because developers must understand and address several interdependent and pervasive dependability concerns. Features that addr...
Lydia Michotte, Robert B. France, Franck Fleurey
104
Voted
CCGRID
2005
IEEE
15 years 8 months ago
ReGS: user-level reliability in a grid environment
Grid environments are ideal for executing applications that require a huge amount of computational work, both due to the big number of tasks to execute and to the large amount of ...
J. A. L. Sanches, Patrícia Kayser Vargas, I...
118
Voted
DEXA
2004
Springer
147views Database» more  DEXA 2004»
15 years 8 months ago
A Flexible Fuzzy Expert System for Fuzzy Duplicate Elimination in Data Cleaning
Data cleaning deals with the detection and removal of errors and inconsistencies in data, gathered from distributed sources. This process is essential for drawing correct conclusio...
Hamid Haidarian Shahri, Ahmad Abdollahzadeh Barfor...
101
Voted
IJAR
2007
113views more  IJAR 2007»
15 years 2 months ago
Fuzzy clustering in parallel universes
We present an extension of the fuzzy c-Means algorithm, which operates simultaneously on different feature spaces—so-called parallel universes—and also incorporates noise det...
Bernd Wiswedel, Michael R. Berthold