Sciweavers

12637 search results - page 2391 / 2528
» Security for Extensible Systems
Sort
View
ESE
2006
154views Database» more  ESE 2006»
15 years 4 months ago
Prioritizing JUnit Test Cases: An Empirical Assessment and Cost-Benefits Analysis
Test case prioritization provides a way to run test cases with the highest priority earliest. Numerous empirical studies have shown that prioritization can improve a test suite�...
Hyunsook Do, Gregg Rothermel, Alex Kinneer
IJIIDS
2008
201views more  IJIIDS 2008»
15 years 4 months ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...
CCR
2007
86views more  CCR 2007»
15 years 4 months ago
An addressing independent networking structure favorable for all-optical packet switching
All-optical packet switching (AOPS) technology is essential to fully utilize the tremendous bandwidth provided by advanced optical communication techniques through forwarding pack...
Shengming Jiang
CN
2007
91views more  CN 2007»
15 years 4 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke
JSS
2008
96views more  JSS 2008»
15 years 4 months ago
DR-TCP: Downloadable and reconfigurable TCP
Advances in communication technology allow a variety of new network environments and services available very rapidly. Appearance of various network environments tends to enable a ...
Jae-Hyun Hwang, Jin-Hee Choi, Se-Won Kim, Chuck Yo...
« Prev « First page 2391 / 2528 Last » Next »