Sciweavers

2747 search results - page 214 / 550
» Network externalities in software systems
Sort
View
127
Voted
IPPS
2007
IEEE
15 years 9 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel
154
Voted
KBSE
2005
IEEE
15 years 9 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
SIGSOFT
2007
ACM
16 years 4 months ago
Does a programmer's activity indicate knowledge of code?
The practice of software development can likely be improved if an externalized model of each programmer's knowledge of a particular code base is available. Some tools already...
Thomas Fritz, Gail C. Murphy, Emily Hill
137
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
Automated Inference of Pointcuts in Aspect-Oriented Refactoring
Software refactoring is the process of reorganizing the internal structure of code while preserving the external behavior. Aspect-Oriented Programming (AOP) provides new modulariz...
Prasanth Anbalagan, Tao Xie
106
Voted
CIKM
2009
Springer
15 years 10 months ago
Collaborative filtering using random neighbours in peer-to-peer networks
Traditionally, collaborative filtering (CF) algorithms used for recommendation operate on complete knowledge. This makes these algorithms hard to employ in a decentralized contex...
Arno Bakker, Elth Ogston, Maarten van Steen