Sciweavers

2747 search results - page 160 / 550
» Network externalities in software systems
Sort
View
ICARIS
2007
Springer
15 years 9 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
130
Voted
IJCAI
1989
15 years 4 months ago
A Technique for Customizing Object-Oriented Knowledge Representation Systems, With An Application to Network Problem Management
Over the last few years, object-oriented techniques have gained an increasing recognition both in software engineering and in AI. Object-oriented systems present undisputable adva...
Lisiane Goffaux, Robert Mathonet
112
Voted
CACM
1998
83views more  CACM 1998»
15 years 3 months ago
A Pattern System for Network Management Interfaces
: The development of network management interfaces (NMIs) involves a variety of software layers, application programming interfaces (APIs), specification languages and tools. In or...
Rudolf K. Keller, Jean Tessier, Gregor von Bochman...
IWPC
2007
IEEE
15 years 9 months ago
Empirical Evaluation of a UML Sequence Diagram with Adornments to Support Understanding of Thread Interactions
Programs that use multi-threaded concurrency are known to be difficult to design. Moreover, research in computer-science education suggests that concurrency and synchronization co...
Shaohua Xie, Eileen Kraemer, R. E. Kurt Stirewalt
CODES
2007
IEEE
15 years 10 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...