Sciweavers

1801 search results - page 326 / 361
» Software Patterns in ITS Architectures
Sort
View
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 8 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
CORR
2004
Springer
129views Education» more  CORR 2004»
13 years 8 months ago
Runtime Reconfiguration of J2EE Applications
: Runtime reconfiguration considered as "applying required changes to a running system" plays an important role for providing high availability not only of safety- and mi...
Jasminka Matevska-Meyer, Sascha Olliges, Wilhelm H...
ENTCS
2002
145views more  ENTCS 2002»
13 years 8 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
EXACT
2009
13 years 6 months ago
Towards the Explanation of Workflows
Across many fields involving complex computing, software systems are being augmented with workflow logging functionality. The log data can be effectively organized using declarativ...
James Michaelis, Li Ding, Deborah L. McGuinness
TASLP
2010
117views more  TASLP 2010»
13 years 3 months ago
The CALO Meeting Assistant System
Abstract-The CALO Meeting Assistant (MA) provides for distributed meeting capture, annotation, automatic transcription and semantic analysis of multiparty meetings, and is part of ...
Gökhan Tür, Andreas Stolcke, L. Voss, St...