Sciweavers

1406 search results - page 219 / 282
» Software trace cache
Sort
View
ICFCA
2010
Springer
14 years 2 months ago
Describing Role Models in Terms of Formal Concept Analysis
Abstract. In the past years Software Engineering has experienced several difficulties in modularising crosscutting aspects, like shared, dynamic or scattered behavior of object-ori...
Henri Mühle, Christian Wende
ISPASS
2008
IEEE
14 years 2 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
COMPSAC
2007
IEEE
14 years 2 months ago
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
Xia Wang, Johnny Wong
IWPC
2007
IEEE
14 years 1 months ago
Recovering Workflows from Multi Tiered E-commerce Systems
A workflow is a computerized specification of a business process. A workflow describes how tasks are executed and ordered following business policies. E-commerce systems implement...
Maokeng Hung, Ying Zou
OTM
2007
Springer
14 years 1 months ago
Property-Preserving Evolution of Components Using VPA-Based Aspects
Abstract. Protocols that govern the interactions between software components are a popular means to support the construction of correct component-based systems. Previous studies ha...
Dong Ha Nguyen, Mario Südholt