Sciweavers

8177 search results - page 348 / 1636
» Detecting System Emulators
Sort
View
187
Voted
ICSM
1999
IEEE
15 years 8 months ago
Test Case Prioritization: An Empirical Study
Test case prioritization techniques schedule test cases for execution in an order that attempts to maximize some objective function. A variety of objective functions are applicabl...
Gregg Rothermel, Roland H. Untch, Chengyun Chu, Ma...
113
Voted
ICIW
2007
IEEE
15 years 7 months ago
A Refined Goal Model for Semantic Web Services
The idea of service orientation envisions dynamic detection and execution of suitable Web services for solving a particular request. Most realization approaches pay only little att...
Michael Stollberg, Barry Norton
154
Voted
LREC
2008
140views Education» more  LREC 2008»
15 years 5 months ago
Toward Active Learning in Data Selection: Automatic Discovery of Language Features During Elicitation
Data Selection has emerged as a common issue in language technologies. We define Data Selection as the choosing of a subset of training data that is most effective for a given tas...
Jonathan Clark, Robert E. Frederking, Lori S. Levi...
135
Voted
IPPS
2007
IEEE
15 years 10 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai
124
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...