Sciweavers

741 search results - page 126 / 149
» Tools and techniques for Network Forensics
Sort
View
GROUP
2005
ACM
14 years 2 months ago
Seeking the source: software source code as a social and technical artifact
In distributed software development, two sorts of dependencies can arise. The structure of the software system itself can create dependencies between software elements, while the ...
Cleidson R. B. de Souza, Jon Froehlich, Paul Douri...
WAC
2005
Springer
118views Communications» more  WAC 2005»
14 years 2 months ago
Experiments on the Automatic Evolution of Protocols Using Genetic Programming
Truly autonomic networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design t...
Lidia Yamamoto, Christian F. Tschudin
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 2 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
CISIS
2010
IEEE
14 years 2 months ago
Semantic Web Fostering Enterprise 2.0
—The term Enterprise 2.0 applies to the use of Web 2.0 technologies as a support for business activities within the organizations. These technologies are exploited to foster inte...
Nicola Capuano, Matteo Gaeta, Francesco Orciuoli, ...
CODES
2003
IEEE
14 years 2 months ago
Synthesis of real-time embedded software with local and global deadlines
Current methods cannot synthesize real-time embedded software applications when the global deadline of a task is shorter than the total of all local deadlines along a critical pat...
Pao-Ann Hsiung, Cheng-Yi Lin