Sciweavers

2757 search results - page 376 / 552
» On separating systems
Sort
View
118
Voted
DIMVA
2007
15 years 6 months ago
Characterizing Bots' Remote Control Behavior
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a “commandand-control” overlay network. We investigate observab...
Elizabeth Stinson, John C. Mitchell
ICWS
2007
IEEE
15 years 6 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
156
Voted
SWWS
2008
15 years 6 months ago
A User Guided Iterative Alignment Approach for Ontology Mapping
- The future of the Semantic Web envisions an interconnected network of data and systems where software agents can communicate seamlessly to perform complicated tasks with limited ...
Danny Chen, John Lastusky, James Starz, Stephen Ho...
CASCON
2004
129views Education» more  CASCON 2004»
15 years 6 months ago
Practical language-independent detection of near-miss clones
Previous research shows that most software systems contain significant amounts of duplicated, or cloned, code. Some clones are exact duplicates of each other, while others differ ...
James R. Cordy, Thomas R. Dean, Nikita Synytskyy
125
Voted
IADIS
2004
15 years 6 months ago
A Generic Framework for Assessment in Adaptive Educational Hypermedia
An important concern in web based educational environment is the task of designing and preparing learner assessment, which would enhance the learning process. Currently the majori...
Lilia Cheniti-Belcadhi, Rafik Braham, Nicola Henze...