Sciweavers

2178 search results - page 283 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ECMDAFA
2006
Springer
137views Hardware» more  ECMDAFA 2006»
13 years 11 months ago
Harvesting Software Systems for MDA-Based Reengineering
Abstract. In this paper we report on a feasibility study in reengineering legacy systems towards a model-driven architecture (MDA). Steps in our approach consist of (1) parsing the...
Thijs Reus, Hans Geers, Arie van Deursen
SAC
2004
ACM
14 years 1 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
ICDE
2004
IEEE
101views Database» more  ICDE 2004»
14 years 9 months ago
Personalization of Queries in Database Systems
As information becomes available in increasing amounts to a wide spectrum of users, the need for a shift towards a more user-centered information access paradigm arises. We develo...
Georgia Koutrika, Yannis E. Ioannidis
ISMVL
2000
IEEE
121views Hardware» more  ISMVL 2000»
14 years 13 days ago
Evolvable Hardware: From On-Chip Circuit Synthesis to Evolvable Space Systems
Evolvable Hardware (EHW) refers to HW design and self-reconfiguration using evolutionary/genetic mechanisms. The paper presents an overview of some key concepts of EHW, comments o...
Adrian Stoica
FTCS
1998
77views more  FTCS 1998»
13 years 9 months ago
Strong Partitioning Protocol for a Multiprocessor VME System
The trend in implementing today's embedded applications is toward the use of commercial-off-the-shelf open architecture. Reducing costs and facilitating systems integration a...
Mohamed F. Younis, Jeffrey X. Zhou, Mohamed Abouta...