Sciweavers

1954 search results - page 276 / 391
» Improving Software Development Processes with Multicriteria ...
Sort
View
ASWEC
2000
IEEE
15 years 2 months ago
ReVis: Reverse Engineering by Clustering and Visual Object Classification
This paper presents the framework of a scale-oriented scheme for the presentation and classification of reverse engineered sections of procedural code into objects. The aim is to ...
Aaron J. Quigley, Margot Postema, Heinz W. Schmidt
LISA
2001
14 years 11 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
COMPSAC
2003
IEEE
15 years 3 months ago
Effects of Introducing Survival Behaviours into Automated Negotiators
With the rise of distributed e-commerce in recent years, demand for automated negotiation has increased. In turn, this has facilitated a demand for ever more complex algorithms to...
Peter Henderson, Stephen Crouch, Robert John Walte...
SPIN
2009
Springer
15 years 4 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
BMCBI
2010
129views more  BMCBI 2010»
14 years 10 months ago
Detection of distant evolutionary relationships between protein families using theory of sequence profile-profile comparison
Background: Detection of common evolutionary origin (homology) is a primary means of inferring protein structure and function. At present, comparison of protein families represent...
Mindaugas Margelevicius, Ceslovas Venclovas