Sciweavers

677 search results - page 71 / 136
» Rigorous Object-Oriented Analysis
Sort
View
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 1 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
113
Voted
HICSS
2007
IEEE
181views Biometrics» more  HICSS 2007»
15 years 7 months ago
A Methodology to Evaluate Agent Oriented Software Engineering Techniques
Systems using Software Agents (or Multi-Agent Systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an Agent aims to handle task...
Chia-En Lin, Krishna M. Kavi, Frederick T. Sheldon...
124
Voted
KBSE
2005
IEEE
15 years 6 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
SIGCSE
2000
ACM
453views Education» more  SIGCSE 2000»
15 years 5 months ago
Aristotle and object-oriented programming: why modern students need traditional logic
Classifying is a central activity in object-oriented programming and distinguishes it from procedural programming. Traditional logic, initiated by Aristotle, assigns classificatio...
Derek Rayside, Gerard T. Campbell
112
Voted
ADAEUROPE
2000
Springer
15 years 5 months ago
On Persistent and Reliable Streaming in Ada
Saving internal program data for further use is one of the most useful ideas in programming. Developing general features to provide such data saving/ restoring is a very active res...
Jörg Kienzle, Alexander B. Romanovsky