Sciweavers

2131 search results - page 276 / 427
» Multi-Agent System Development: Design, Runtime, and Analysi...
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
14 years 12 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
AVI
2008
14 years 11 months ago
Visualizing program similarity in the Ac plagiarism detection system
Programming assignments are easy to plagiarize in such a way as to foil casual reading by graders. Graders can resort to automatic plagiarism detection systems, which can generate...
Manuel Freire
ACMSE
2005
ACM
15 years 3 months ago
Exploring communication overheads and locking policies in a peer-to-peer synchronous collaborative editing system
In this paper, we describe recent work in developing a peer-topeer collaborative environment. The study examines various locking mechanisms/policies by adjusting the granularity o...
Jon A. Preston, Sushil K. Prasad
WCRE
1999
IEEE
15 years 2 months ago
Recovering Code to Documentation Links in OO Systems
Software system documentation is almost always expressed informally, in natural language and free text. Examples include requirement specifications, design documents, manual pages...
Giuliano Antoniol, Gerardo Canfora, Andrea De Luci...
EMSOFT
2006
Springer
15 years 1 months ago
Defining a strategy to introduce a software product line using existing embedded systems
Engine Control Systems (ECS) for automobiles have numerous variants for many manufactures and different markets. To improve development efficiency, exploiting ECS commonalities an...
Kentaro Yoshimura, Dharmalingam Ganesan, Dirk Muth...