Sciweavers

39 search results - page 3 / 8
» Provenance and evidence in UniProtKB
Sort
View
WORDS
2005
IEEE
14 years 5 days ago
Towards a Dependable Component Technology for Embedded System Applications
Component-based software engineering is a technique that has proven effective to increase reusability and efficiency in development of office and web applications. Though being ...
Mikael Åkerholm, Anders Möller, Hans Ha...
ISI
2004
Springer
13 years 12 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
ACSAC
2003
IEEE
13 years 12 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
SIGSOFT
2005
ACM
14 years 7 months ago
Lightweight object specification with typestates
Previous work has proven typestates to be useful for modeling protocols in object-oriented languages. We build on this work by addressing substitutability of subtypes as well as i...
Kevin Bierhoff, Jonathan Aldrich
GECCO
2009
Springer
14 years 1 months ago
On the scalability of XCS(F)
Many successful applications have proven the potential of Learning Classifier Systems and the XCS classifier system in particular in datamining, reinforcement learning, and func...
Patrick O. Stalph, Martin V. Butz, David E. Goldbe...