Sciweavers

2747 search results - page 160 / 550
» Network externalities in software systems
Sort
View
ICARIS
2007
Springer
14 years 3 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
IJCAI
1989
13 years 10 months ago
A Technique for Customizing Object-Oriented Knowledge Representation Systems, With An Application to Network Problem Management
Over the last few years, object-oriented techniques have gained an increasing recognition both in software engineering and in AI. Object-oriented systems present undisputable adva...
Lisiane Goffaux, Robert Mathonet
CACM
1998
83views more  CACM 1998»
13 years 8 months ago
A Pattern System for Network Management Interfaces
: The development of network management interfaces (NMIs) involves a variety of software layers, application programming interfaces (APIs), specification languages and tools. In or...
Rudolf K. Keller, Jean Tessier, Gregor von Bochman...
IWPC
2007
IEEE
14 years 3 months ago
Empirical Evaluation of a UML Sequence Diagram with Adornments to Support Understanding of Thread Interactions
Programs that use multi-threaded concurrency are known to be difficult to design. Moreover, research in computer-science education suggests that concurrency and synchronization co...
Shaohua Xie, Eileen Kraemer, R. E. Kurt Stirewalt
CODES
2007
IEEE
14 years 3 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...