Sciweavers

2131 search results - page 132 / 427
» Multi-Agent System Development: Design, Runtime, and Analysi...
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 3 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
NAR
2000
120views more  NAR 2000»
14 years 9 months ago
WIT: integrated system for high-throughput genome sequence analysis and metabolic reconstruction
The WIT (What Is There) (http://wit.mcs.anl.gov/WIT2/ ) system has been designed to support comparative analysis of sequenced genomes and to generate metabolic reconstructions bas...
Ross A. Overbeek, Niels Larsen, Gordon D. Pusch, M...
CAISE
2006
Springer
15 years 1 months ago
Data Conceptualisation for Web-Based Data-Centred Application Design
The paper describes the conceptualisation process in the ReQuest approach, a wide-spectrum methodology for web-based information systems analysis and development. This methodology ...
Julien Vilz, Anne-France Brogneaux, Ravi Ramdoyal,...
ICSE
2007
IEEE-ACM
15 years 10 months ago
Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis
Server page technique is commonly used for implementing web application user interfaces. Server pages can represent many similar web pages in a generic form. Yet our previous stud...
Damith C. Rajapakse, Stan Jarzabek
SIGSOFT
2007
ACM
15 years 10 months ago
A framework for characterization and analysis of software system scalability
The term scalability appears frequently in computing literature, but it is a term that is poorly defined and poorly understood. The lack of a clear, consistent and systematic trea...
Leticia Duboc, David S. Rosenblum, Tony Wicks