Sciweavers

2178 search results - page 292 / 436
» Toward Systemically Secure IT Architectures
Sort
View
IPPS
1998
IEEE
14 years 8 days ago
Design and Implementation of the FRIENDS System
The paper describes a metaobject architecture for distributed fault tolerant systems. Basically metaobject protocols enables functional objects to be independent from meta-function...
Jean-Charles Fabre
ICSE
2007
IEEE-ACM
14 years 8 months ago
Behaviour Model Synthesis from Properties and Scenarios
Synthesis of behaviour models from software development artifacts such as scenario-based descriptions or requirements specifications not only helps significantly reduce the effort...
Greg Brunet, Marsha Chechik, Sebastián Uchi...
COMSWARE
2007
IEEE
14 years 2 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
HT
2005
ACM
14 years 1 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
ICSEA
2006
IEEE
14 years 2 months ago
Enforcing Interaction Properties in AOSD-Enabled Systems
The construction and maintenance of large and complex software systems depend on the existence of global principles describing the structure and the interaction among its various ...
Constantin Serban, Shmuel S. Tyszberowicz