Sciweavers

733 search results - page 103 / 147
» Active Automation of the DITSCAP
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
JCDL
2006
ACM
119views Education» more  JCDL 2006»
15 years 3 months ago
Learning from artifacts: metadata utilization analysis
Describes the MARC Content Designation Utilization Project, which is examining a very large set of metadata records as artifacts of the library cataloging enterprise. This is the ...
William E. Moen, Shawne D. Miksa, Amy Eklund, Serh...
CAISE
2005
Springer
15 years 3 months ago
Software Re-Documentation Process and Tool
Researchers and professionals know the importance of the documentation for the efficient maintenance of legacy software. Unfortunately, many legacy systems lack this important arti...
Nicolas Anquetil, Káthia Marçal de O...
CD
2005
Springer
15 years 3 months ago
Deployment of Infrastructure and Services in the Open Grid Services Architecture (OGSA)
Abstract. The ability to deploy Grid infrastructure and services across organizational boundaries (rapidly, reliably, and scalably) is critical for the success of large-scale servi...
Paul Brebner, Wolfgang Emmerich
ICLP
2005
Springer
15 years 3 months ago
A Distributed and Probabilistic Concurrent Constraint Programming Language
We present a version of the CCP paradigm, which is both distributed and probabilistic. We consider networks with a fixed number of nodes, each of them possessing a local and indep...
Luca Bortolussi, Herbert Wiklicky