Sciweavers

2147 search results - page 378 / 430
» Teleological Software Adaptation
Sort
View
ICAI
2008
13 years 9 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
IRCDL
2008
13 years 9 months ago
OAI-Publishers in Repository Infrastructures
Abstract--OAI-Publishers are software modules implementing the OAI-PMH protocol interface, enabling harvesting of metadata records describing the digital resources of a Digital Rep...
Michele Artini, Federico Biagini, Paolo Manghi, Ma...
IUSED
2008
13 years 9 months ago
Designing Usable Applications based on Web Services
One trend in software development is to implement application functionalities through Web services. This eases the possibility of developing interactive applications exploiting fu...
Fabio Paternò, Carmen Santoro, Lucio Davide...
MASCOTS
2008
13 years 9 months ago
Finding Good Configurations in High-Dimensional Spaces: Doing More with Less
Manually tuning tens to hundreds of configuration parameters in a complex software system like a database or an application server is an arduous task. Recent work has looked into ...
Risi Thonangi, Vamsidhar Thummala, Shivnath Babu
SE
2007
13 years 9 months ago
Enterprise application deployment: A model driven approach
Abstract: Today’s enterprise applications are based on numerous interrelated components that capture domain-specific, generic or infrastructural functionality. Each component is...
Peter Golibrzuch, Alexander Holbreich, Simon Zambr...