Sciweavers

6455 search results - page 961 / 1291
» Research problems
Sort
View
ESORICS
2004
Springer
15 years 10 months ago
Redundancy and Diversity in Security
Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security, which is attracting increasing interest, is less gene...
Bev Littlewood, Lorenzo Strigini
155
Voted
EWCBR
2004
Springer
15 years 10 months ago
Explanations and Case-Based Reasoning: Foundational Issues
By design, Case-Based Reasoning (CBR) systems do not need deep general knowledge. In contrast to (rule-based) expert systems, CBR systems can already be used with just some initial...
Thomas Roth-Berghofer
EWSA
2004
Springer
15 years 10 months ago
Distilling Scenarios from Patterns for Software Architecture Evaluation - A Position Paper
Software architecture (SA) evaluation is a quality assurance technique that is increasingly attracting significant research and commercial interests. A number of SA evaluation meth...
Liming Zhu, Muhammad Ali Babar, D. Ross Jeffery
FORMATS
2004
Springer
15 years 10 months ago
Bounded Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this reg...
Fang Yu, Bow-Yaw Wang, Yao-Wen Huang
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 10 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...