Sciweavers

759 search results - page 59 / 152
» What Can Be Implemented Anonymously
Sort
View
SCAM
2007
IEEE
14 years 4 months ago
Relating the Evolution of Design Patterns and Crosscutting Concerns
Crosscutting concerns consist in software system features having the implementation spread across modules as tangled and scattered code. In many cases, these crosscutting concerns...
Lerina Aversano, Luigi Cerulo, Massimiliano Di Pen...
SEKE
2007
Springer
14 years 4 months ago
Real-Time Trust Management in Agent Based Online Auction Systems
Agent based online auctions have not yet become popular because they are not trustable. One of the major concerns in agent based online auctions is the shilling behavior problem, w...
Rinkesh Patel, Haiping Xu, Ankit Goel
ICSM
2006
IEEE
14 years 4 months ago
An Extensible Meta-Model for Program Analysis
— Software maintenance tools for program analysis and refactoring rely on a meta-model capturing the relevant properties of programs. However, what is considered relevant may cha...
Dennis Strein, Rüdiger Lincke, Jonas Lundberg...
IPPS
2006
IEEE
14 years 4 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
INTETAIN
2005
Springer
14 years 3 months ago
Disjunctor Selection for One-Line Jokes
Here we present a model of a subtype of one-line jokes (not puns) that describes the relationship between the connector (part of the setup) and the disjunctor (often called the pun...
Jeff Stark, Kim Binsted, Benjamin Bergen