Sciweavers

429 search results - page 76 / 86
» Scoping software product lines
Sort
View
SECURWARE
2007
IEEE
14 years 1 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 7 months ago
Integration of Agile Ontology Mapping towards NLP Search in I-SOAS
In this research paper we address the importance of Product Data Management (PDM) with respect to its contributions in industry. Moreover we also present some currently available ...
Zeeshan Ahmed, Ina Tacheva
IWEC
2004
13 years 9 months ago
Development of Extemporaneous Performance by Synthetic Actors in the Rehearsal Process
Autonomous synthetic actors must invent variations of known material in order to perform given only a limited script, and to assist the director with development of the performance...
Tony A. Meyer, Chris H. Messom
ICSM
2003
IEEE
14 years 29 days ago
Deriving tolerant grammars from a base-line grammar
A grammar-based approach to tool development in re- and reverse engineering promises precise structure awareness, but it is problematic in two respects. Firstly, it is a considera...
Steven Klusener, Ralf Lämmel
KI
2008
Springer
13 years 7 months ago
On Restaurants and Requirements: How Requirements Engineering may be Facilitated by Scripts
Requirements engineering is a central part of software projects. It is assumed that two third of all errors in software projects are caused by forgotten requirements or mutual misu...
Christoph Peylo