Sciweavers

1251 search results - page 126 / 251
» A Method for Component-Based Software and System Development
Sort
View
123
Voted
HICSS
2006
IEEE
142views Biometrics» more  HICSS 2006»
15 years 9 months ago
Measuring the Effectiveness of Honeypot Counter-Counterdeception
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
Neil C. Rowe
NSPW
2006
ACM
15 years 9 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
91
Voted
CIARP
2003
Springer
15 years 8 months ago
Automatic Dark Fibres Detection in Wool Tops
Is proposed a method for the automatic detection of dark fibres in wool tops based on image processing. A software which implements this method was developed, composed by five mo...
J. Bazerque, J. Ciambelli, S. Lafon, S. Randall
122
Voted
ISSRE
2008
IEEE
15 years 9 months ago
Cost Curve Evaluation of Fault Prediction Models
Prediction of fault prone software components is one of the most researched problems in software engineering. Many statistical techniques have been proposed but there is no consen...
Yue Jiang, Bojan Cukic, Tim Menzies
114
Voted
ICSE
1999
IEEE-ACM
15 years 7 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...