Sciweavers

2747 search results - page 214 / 550
» Network externalities in software systems
Sort
View
IPPS
2007
IEEE
15 years 7 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel
KBSE
2005
IEEE
15 years 6 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
110
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Does a programmer's activity indicate knowledge of code?
The practice of software development can likely be improved if an externalized model of each programmer's knowledge of a particular code base is available. Some tools already...
Thomas Fritz, Gail C. Murphy, Emily Hill
ICSE
2007
IEEE-ACM
16 years 1 months ago
Automated Inference of Pointcuts in Aspect-Oriented Refactoring
Software refactoring is the process of reorganizing the internal structure of code while preserving the external behavior. Aspect-Oriented Programming (AOP) provides new modulariz...
Prasanth Anbalagan, Tao Xie
CIKM
2009
Springer
15 years 7 months ago
Collaborative filtering using random neighbours in peer-to-peer networks
Traditionally, collaborative filtering (CF) algorithms used for recommendation operate on complete knowledge. This makes these algorithms hard to employ in a decentralized contex...
Arno Bakker, Elth Ogston, Maarten van Steen