Sciweavers

1554 search results - page 249 / 311
» Testing Polymorphic Behavior
Sort
View
DSOM
2008
Springer
13 years 9 months ago
SYMIAN: A Simulation Tool for the Optimization of the IT Incident Management Process
Incident Management is the process through which IT support organizations manage to restore normal service operation after a service disruption. The complexity of IT support organi...
Claudio Bartolini, Cesare Stefanelli, Mauro Torton...
GRAPHICSINTERFACE
2008
13 years 9 months ago
Order and entropy in picture passwords
Previous efforts involving picture-based passwords have not focused on maintaining a measurably high level of entropy. Since password systems usually allow user selection of passw...
Saranga Komanduri, Dugald Ralph Hutchings
IJCAI
2007
13 years 9 months ago
Adaptive Genetic Algorithm with Mutation and Crossover Matrices
A matrix formulation for an adaptive genetic algorithm is developed using mutation matrix and crossover matrix. Selection, mutation, and crossover are all parameter-free in the se...
Nga Lam Law, Kwok Yip Szeto
PST
2008
13 years 9 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
SIMUTOOLS
2008
13 years 9 months ago
ns-2 vs. OPNET: a comparative study of the IEEE 802.11e technology on MANET environments
In this work we present the results of a comparative study between two well-known network simulators: ns-2 and OPNET Modeler. In particular, we focus on a performance evaluation o...
P. Pablo Garrido, Manuel P. Malumbres, Carlos Migu...