Sciweavers

58 search results - page 10 / 12
» Using Rule-Based Activity Descriptions to Evaluate Intrusion...
Sort
View
WCRE
1999
IEEE
15 years 6 months ago
Experiments with Clustering as a Software Remodularization Method
As valuable software systems get old, reverse engineering becomes more and more important to the companies that have to maintain the code. Clustering is a key activity in reverse ...
Nicolas Anquetil, Timothy Lethbridge
WSC
2004
15 years 3 months ago
How Factory Physics Helps Simulation
Factory physics provides a systematic description, expressed as laws, of the underlying behavior of a system. These laws can provide important assistance in performing simulation ...
Charles R. Standridge
SSDBM
1999
IEEE
135views Database» more  SSDBM 1999»
15 years 6 months ago
Query Processing in the TAMBIS Bioinformatics Source Integration System
Conducting bioinformatic analyses involves biologists in expressing requests over a range of highly heterogeneous information sources and software tools. Such activities are labor...
Norman W. Paton, Robert Stevens, Patricia G. Baker...
SIGSOFT
2002
ACM
16 years 2 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
ICC
2000
IEEE
15 years 6 months ago
A Framework for the Analysis of Adaptive Voice over IP
— In this paper, we present a framework for the analysis of a set of adaptive variable-bit-rate voice sources in a packet network. The instantaneous bit rate of each source is de...
Claudio Casetti, J. C. De Martin, Michela Meo