Sciweavers

173 search results - page 20 / 35
» Dynamic information source selection for intrusion detection...
Sort
View
ICDCS
1999
IEEE
15 years 2 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...
WCRE
1999
IEEE
15 years 2 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
RWEB
2007
Springer
15 years 3 months ago
Reactive Rules on the Web
Reactive rules are used for programming rule-based, reactive systems, which have the ability to detect events and respond to them automatically in a timely manner. Such systems are...
Bruno Berstel, Philippe Bonnard, François B...
SIGCSE
2009
ACM
150views Education» more  SIGCSE 2009»
15 years 10 months ago
Dereferee: exploring pointer mismanagement in student code
Dynamic memory management and the use of pointers are critical topics in teaching the C++ language. They are also some of the most difficult for students to grasp properly. The re...
Anthony Allevato, Manuel A. Pérez-Qui&ntild...
JUCS
2008
98views more  JUCS 2008»
14 years 9 months ago
Spatial Queries in Road Networks Based on PINE
: Over the last decade, due to the rapid developments in information technology (IT), a new breed of information systems has appeared such as geographic information systems that in...
Maytham Safar