Sciweavers

2436 search results - page 159 / 488
» Evaluating Adaptive Problem Selection
Sort
View
115
Voted
FSKD
2008
Springer
128views Fuzzy Logic» more  FSKD 2008»
15 years 4 months ago
Applying Fuzzy PROMETHEE Method for Evaluating IS Outsourcing Suppliers
The demand for outsourcing in the information systems (IS) field has become a part of basic corporate strategy and has experienced a considerable growth in recent years. The proce...
Tien-Chin Wang, L. Y. Chen, Ying-Hsiu Chen
132
Voted
RAID
2010
Springer
15 years 1 months ago
On Challenges in Evaluating Malware Clustering
Malware clustering and classification are important tools that enable analysts to prioritize their malware analysis efforts. The recent emergence of fully automated methods for ma...
Peng Li, Limin Liu, Debin Gao, Michael K. Reiter
CLEIEJ
2010
15 years 29 days ago
Empirical Validation of Component-based Software Systems Generation and Evaluation Approaches
Component-based software development needs to formalize a process of generation, evaluation and selection of Composite COTS-based Software Systems (CCSS), enabling software archit...
Victor Sagredo, Carlos Becerra, Gonzalo Valdes
159
Voted
EPEW
2007
Springer
15 years 9 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
133
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel