Sciweavers

3883 search results - page 652 / 777
» Design mentoring based on design evolution analysis
Sort
View
WCRE
2007
IEEE
15 years 11 months ago
Documenting Typical Crosscutting Concerns
Our analysis of crosscutting concerns in real-life software systems (totaling over 500,000 LOC) and in reports from literature indicated a number of properties that allow for thei...
Marius Marin, Leon Moonen, Arie van Deursen
ADAEUROPE
2007
Springer
15 years 10 months ago
Towards User-Level Extensibility of an Ada Library: An Experiment with Cheddar
In this article, we experiment a way to extend an Ada library called Cheddar. Cheddar provides a domain specific language. Programs written with this domain specific language can...
Frank Singhoff, Alain Plantec
CCS
2007
ACM
15 years 10 months ago
On the infeasibility of modeling polymorphic shellcode
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
149
Voted
CEEMAS
2007
Springer
15 years 10 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CIKM
2007
Springer
15 years 10 months ago
Developing learning strategies for topic-based summarization
Most up-to-date well-behaved topic-based summarization systems are built upon the extractive framework. They score the sentences based on the associated features by manually assig...
Ouyang You, Sujian Li, Wenjie Li