Sciweavers

2560 search results - page 380 / 512
» Analysis Tool for Honeypot Systems
Sort
View
ISF
2011
14 years 9 months ago
A multi-region empirical study on the internet presence of global extremist organizations
Abstract Extremist organizations are heavily utilizing Internet technologies to increase their abilities to influence the world. Studying those global extremist organizations’ In...
Jialun Qin, Yilu Zhou, Hsinchun Chen
124
Voted
KBSE
2005
IEEE
15 years 7 months ago
Determining the cost-quality trade-off for automated software traceability
Major software development standards mandate the establishment of trace links among software artifacts such as requirements, architectural elements, or source code without explici...
Alexander Egyed, Stefan Biffl, Matthias Heindl, Pa...
COMCOM
2011
14 years 9 months ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...
VLDB
2003
ACM
115views Database» more  VLDB 2003»
16 years 2 months ago
Lineage tracing for general data warehouse transformations
Data warehousing systems integrate information from operational data sources into a central repository to enable analysis and mining of the integrated information. During the integ...
Yingwei Cui, Jennifer Widom
96
Voted
DSN
2009
IEEE
15 years 8 months ago
LFI: A practical and general library-level fault injector
Fault injection, a critical aspect of testing robust systems, is often overlooked in the development of generalpurpose software. We believe this is due to the absence of easy-to-u...
Paul Dan Marinescu, George Candea