Sciweavers

581 search results - page 102 / 117
» Software engineering and the Internet: a roadmap
Sort
View
CIMCA
2008
IEEE
14 years 3 months ago
Mining Bug Repositories--A Quality Assessment
The process of evaluating, classifying, and assigning bugs to programmers is a difficult and time consuming task which greatly depends on the quality of the bug report itself. It ...
Philipp Schügerl, Juergen Rilling, Philippe C...
GLOBECOM
2008
IEEE
14 years 3 months ago
Performance Study of the NSIS QoS-NSLP Protocol
—This paper presents an evaluation of the Quality of Service Signalling Layer Protocol (QoS-NSLP) of the NSIS (Next Steps In Signalling) protocol suite. The QoS-NSLP in combinati...
Mayutan Arumaithurai, Xiaoming Fu, Bernd Schloer, ...
COMSWARE
2007
IEEE
14 years 2 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
COMSWARE
2007
IEEE
14 years 2 months ago
S-WOW: Signature based Wake-on-WLAN
Abstract— Long distance Wi-Fi links are cost effective alternative to provide internet and VoIP connectivity, in rural areas. In developing regions these low cost solutions have ...
Nilesh Mishra, Dhiraj Golcha, Akhilesh Bhadauria, ...
ICARIS
2007
Springer
14 years 2 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...