Sciweavers

368 search results - page 6 / 74
» System BV is NP-complete
Sort
View
IS
2007
14 years 9 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
FSS
2002
82views more  FSS 2002»
14 years 9 months ago
Fuzzy controller for a system with uncertain load
In many applications of motion control, problems associated with imprecisely measured or changing load (a mass or a moment of inertia) can be a serious obstacle in the formation o...
Piotr Kulczycki, Rafael Wisniewski
COMCOM
2007
98views more  COMCOM 2007»
14 years 9 months ago
Anomaly detection in TCP/IP networks using immune systems paradigm
The paper presents an architecture of an anomaly detection system based on the paradigm of artificial immune systems (AISs). Incoming network traffic data are considered by the s...
Franciszek Seredynski, Pascal Bouvry
INFSOF
2007
101views more  INFSOF 2007»
14 years 9 months ago
Clustering large software systems at multiple layers
Software clustering algorithms presented in the literature rarely incorporate in the clustering process dynamic information, such as the number of function invocations during runt...
Bill Andreopoulos, Aijun An, Vassilios Tzerpos, Xi...
IWC
2007
119views more  IWC 2007»
14 years 9 months ago
Dependable domestic systems design: A socio-technical approach
This paper describes a model that defines the attributes of domestic systems that lead to system dependability and a user-oriented specification method for support systems based...
Ian Sommerville, Guy Dewsbury