Sciweavers

4764 search results - page 783 / 953
» Applications of Error-Control Coding
Sort
View
121
Voted
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
FASE
2007
Springer
15 years 10 months ago
EQ-Mine: Predicting Short-Term Defects for Software Evolution
We use 63 features extracted from sources such as versioning and issue tracking systems to predict defects in short time frames of two months. Our multivariate approach covers aspe...
Jacek Ratzinger, Martin Pinzger, Harald Gall
121
Voted
GTTSE
2007
Springer
15 years 10 months ago
Design Space of Heterogeneous Synchronization
Abstract. This tutorial explores the design space of heterogeneous synchronization, which is concerned with establishing consistency among artifacts that conform to different sche...
Michal Antkiewicz, Krzysztof Czarnecki
HOLOMAS
2007
Springer
15 years 10 months ago
A Holonic Metamodel for Agent-Oriented Analysis and Design
Abstract. Holonic multiagent systems (hmas) offers a promising software engineering approach for developing applications in complex domains characterized by a hierarchical structu...
Massimo Cossentino, Nicolas Gaud, Stéphane ...
139
Voted
HPCC
2007
Springer
15 years 10 months ago
Software Pipelining for Packet Filters
Packet filters play an essential role in traffic management and security management on the Internet. In order to create software-based packet filters that are fast enough to work...
Yoshiyuki Yamashita, Masato Tsuru