Sciweavers

3920 search results - page 575 / 784
» Challenges in Software Evolution
Sort
View
WOSP
2004
ACM
15 years 10 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...
165
Voted
ASWSD
2004
Springer
15 years 10 months ago
On the Fault Hypothesis for a Safety-Critical Real-Time System
– A safety-critical real-time computer system must provide its services with a dependability that is much better than the dependability of any one of its constituent components. ...
Hermann Kopetz
CC
2004
Springer
15 years 10 months ago
Developing a Foundation for Code Optimization
Although optimization technology has been successful over the past 40 years, recent trends are emerging that demand we reconsider the paradigm that we are using for code optimizati...
Mary Lou Soffa
LCPC
2004
Springer
15 years 10 months ago
HiLO: High Level Optimization of FFTs
As computing platforms become more and more complex, the task of optimizing performance critical codes becomes more challenging. Recently, more attention has been focused on automa...
Nick Rizzolo, David A. Padua
MATES
2004
Springer
15 years 10 months ago
Developing Tools for Agent-Oriented Visual Modeling
Most of the Agent-Oriented software engineering methodologies that have been developed in the last years tend to propose a model-based approach to software development. To be put i...
Anna Perini, Angelo Susi