Sciweavers

5345 search results - page 1006 / 1069
» Using a Technique from Graphic Designers to Develop Innovati...
Sort
View
OOPSLA
2009
Springer
14 years 2 months ago
Scalable nonblocking concurrent objects for mission critical code
The high degree of complexity and autonomy of future robotic space missions, such as Mars Science Laboratory (MSL), poses serious challenges in assuring their reliability and efï¬...
Damian Dechev, Bjarne Stroustrup
BMCBI
2005
117views more  BMCBI 2005»
13 years 7 months ago
Differentiation of regions with atypical oligonucleotide composition in bacterial genomes
Background: Complete sequencing of bacterial genomes has become a common technique of present day microbiology. Thereafter, data mining in the complete sequence is an essential st...
Oleg N. Reva, Burkhard Tümmler
CMS
2003
171views Communications» more  CMS 2003»
13 years 9 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
ATAL
2009
Springer
14 years 2 months ago
An agent-based approach to component management
This paper details the implementation of a software framework that aids the development of distributed and self-configurable software systems. This framework is an instance of a n...
David Lillis, Rem W. Collier, Mauro Dragone, Grego...
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
« Prev « First page 1006 / 1069 Last » Next »