Sciweavers

2210 search results - page 285 / 442
» Applying a Model-based Approach for Embedded System Developm...
Sort
View
107
Voted
SAC
2006
ACM
15 years 8 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
111
Voted
HT
2003
ACM
15 years 8 months ago
User-controlled link adaptation
This paper introduces an adaptable hypermedia approach applied to adaptive link annotation techniques. This approach suggests that the combination of direct manipulation with auto...
Theophanis Tsandilas, Monica M. C. Schraefel
132
Voted
RTAS
2006
IEEE
15 years 8 months ago
Scalable Modeling and Performance Evaluation of Wireless Sensor Networks
A notable features of many proposed Wireless Sensor Networks (WSNs) deployments is their scale: hundreds to thousands of nodes linked together. In such systems, modeling the state...
YoungMin Kwon, Gul Agha
129
Voted
MSR
2005
ACM
15 years 8 months ago
Mining evolution data of a product family
Diversification of software assets through changing requirements impose a constant challenge on the developers and maintainers of large software systems. Recent research has addr...
Michael Fischer, Johann Oberleitner, Jacek Ratzing...
118
Voted
ICCS
2000
Springer
15 years 6 months ago
Conceptual Knowledge Discovery and Data Analysis
In this paper, we discuss Conceptual Knowledge Discovery in Databases (CKDD) in its connection with Data Analysis. Our approach is based on Formal Concept Analysis, a mathematical ...
Joachim Hereth Correia, Gerd Stumme, Rudolf Wille,...