Sciweavers

851 search results - page 86 / 171
» Managing (Requirements) Evolutions of High Assurance Systems
Sort
View
IAW
2003
IEEE
15 years 7 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
SAC
2005
ACM
15 years 7 months ago
SVD-based collaborative filtering with privacy
Collaborative filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar users...
Huseyin Polat, Wenliang Du
GPC
2007
Springer
15 years 7 months ago
CFR: A Peer-to-Peer Collaborative File Repository System
Abstract. Due to the high availability of the Internet, many large crossorganization collaboration projects, such as SourceForge, grid systems etc., have emerged. One of the fundam...
Meng-Ru Lin, Ssu-Hsuan Lu, Tsung-Hsuan Ho, Peter L...
ENTCS
2006
158views more  ENTCS 2006»
15 years 1 months ago
Towards a Subject-Oriented Model-Driven Framework
Model-Driven Architecture is an approach of the OMG, its objective is to tackle problems such as: the high availability that a software product requires to be ready for use, the h...
Pablo Amaya, Carlos González, Juan M. Muril...
EWSPT
2001
Springer
15 years 6 months ago
A Mobile Agent Approach to Process-Based Dynamic Adaptation of Complex Software Systems
We describe an approach based upon software process technology to on-the-fly monitoring, redeployment, reconfiguration, and in general dynamic adaptation of distributed software ap...
Giuseppe Valetto, Gail E. Kaiser, Gaurav S. Kc