Sciweavers

977 search results - page 175 / 196
» Soft Constraints for Security
Sort
View
CSMR
2006
IEEE
15 years 3 months ago
A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations
Software-intensive systems evolve continuously under the pressure of new and changing requirements, generally leading to an increase in overall system complexity. In this respect,...
Igor Ivkovic, Kostas Kontogiannis
DSN
2006
IEEE
15 years 3 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
ICEBE
2005
IEEE
165views Business» more  ICEBE 2005»
15 years 3 months ago
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems
Service-Oriented Computing (SOC) and Web Services (WS) provide a flexible computing platform for electronic business and commerce. Introducing policy-based computing to service-or...
Wei-Tek Tsai, Xinxin Liu, Yinong Chen
ACIVS
2005
Springer
15 years 3 months ago
Designing Area and Performance Constrained SIMD/VLIW Image Processing Architectures
Abstract. Image processing is widely used in many applications, including medical imaging, industrial manufacturing and security systems. In these applications, the size of the ima...
Hamed Fatemi, Henk Corporaal, Twan Basten, Richard...
ATAL
2005
Springer
15 years 3 months ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards