Sciweavers

750 search results - page 141 / 150
» Value-Based Selection of Requirements Engineering Tool Suppo...
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
OOPSLA
2004
Springer
14 years 29 days ago
Resolving feature convolution in middleware systems
Middleware provides simplicity and uniformity for the development of distributed applications. However, the modularity of the architecture of middleware is starting to disintegrat...
Charles Zhang, Hans-Arno Jacobsen
DLOG
1996
13 years 9 months ago
Can Description Logics Be Used in Real-Life Knowledge-Based Systems?
In 1995, I nished my Ph.D. project which was focused on the selection of adequate Knowledge-Representation Systems (KRSs) for research applications. When I started working at the ...
Piet-Hein Speel
SCAM
2003
IEEE
14 years 26 days ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
ECAI
1998
Springer
13 years 12 months ago
What You See Is What You Meant: direct knowledge editing with natural language feedback
Many kinds of knowledge-based system would be easier to develop and maintain if domain experts (as opposed to knowledge engineers) were in a position to define and edit the knowled...
Richard Power, Donia Scott, Roger Evans