Sciweavers

1855 search results - page 292 / 371
» System Consequence
Sort
View
ECBS
2011
IEEE
204views Hardware» more  ECBS 2011»
12 years 9 months ago
Towards Comprehensive Modelling by Inter-model Links Using an Integrating Repository
—Model-based development techniques enable a high efficiency and the mastering of complexity. For many domains more than one model has to be used to express the relevant informat...
Matthias Riebisch, Stephan Bode, Qurat-ul-ann Faro...
STORAGESS
2005
ACM
14 years 3 months ago
An electric fence for kernel buffers
Improper access of data buffers is one of the most common errors in programs written in assembler, C, C++, and several other languages. Existing programs and OSs frequently acces...
Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu,...
ECOOP
2005
Springer
14 years 3 months ago
The Role of Design Information in Software Evolution
Software modeling has received a lot a of attention in the last decade and now is an important support for the design process. Actually, the design process is very important to the...
Walter Cazzola, Sonia Pini, Massimo Ancona
ADVIS
2004
Springer
14 years 3 months ago
Incremental Association Rule Mining Using Materialized Data Mining Views
Data mining is an interactive and iterative process. Users issue series of similar queries until they receive satisfying results, yet currently available data mining systems do not...
Mikolaj Morzy, Tadeusz Morzy, Zbyszko Króli...
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 10 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi