Search results for "computer.software_genre"

showing 10 items of 3858 documents

An Expert System for the Design of Agents

2007

The growing interest for the design and development of multi-agent systems has brought to the creation of a specific research area called Agent-Oriented Software Engineering (AOSE), specifically conceived for the development of complex systems. The development of such systems needs the support of appropriate tools that could help the designer in producing the design artefacts. We developed a tool called Metameth that may be used to define a new (agent-oriented) design process as well as to apply it. In this paper, we describe only a slice of this complex tool, specifically addressing the interaction with human actors (the designers). This subsystem is conceived as a collaborative multi-agen…

Software engineering process definitionInformation Systems and ManagementKnowledge managementbusiness.industryComputer scienceMulti-agent systemProcess designInformation Systemcomputer.software_genreExpert systemDesign briefMulti-agent systemDesign educationDesign methodologyInformation systemDesign processSoftware engineeringbusinessComputer-aided software engineeringAgent supported cooperative workcomputerExpert system
researchProduct

State Model of Service Reliability

2006

We propose a simple formalism for modelling of a service reliability. A service is defined as an ordered set of states of a modelled application. In the model, a certain reliability is assigned to each application state. Reliability of a service is expressed in terms of above partial reliabilities.

Software frameworkComputer scienceSoftware sizingComponent-based software engineeringSoftware reliability testingSoftware systemApplication softwarecomputer.software_genrecomputerSoftware measurementSoftware qualityReliability engineering2006 International Conference on Dependability of Computer Systems
researchProduct

Panel Discussion: Systems for Data Analysis What they AEE; what they Could be?

1985

CRANE: I’d like to pose a couple of questions: (1) Command Languages — A tool for the astronomer or for the programmer? (2) Portability — Holy Cow or Red Herring? I propose that we start with the first one and see how far we get. If we don’t get past that, fine. If we get on to the question of portability, this is also fine. Let me just open up the discussion by asking Rudi Albrecht to make a comment.

Software portabilityAstronomerApplication programming interfaceProgramming languageComputer sciencecomputer.software_genreProgrammercomputerPanel discussionVector processor
researchProduct

Tuning Java to Run Interactive Multiagent Simulations over Jason

2010

Java-based simulation environments are currently used by many multiagent systems (MAS), since they mainly provide portability as well as an interesting reduction of the development cost. However, this kind of MAS are rarely considered when developing interactive applications with time response constraints. This paper analyses the performance provided by Jason, a well-known Java-based MAS platform, as a suitable framework for developing interactive multiagent simulations. We show how to tune both the heap size and the garbage collection of the Java Virtual Machine in order to achieve a good performance while executing a simple locomotion benchmark based on crowd simulations. Furthermore, the…

Software portabilityReal time JavaJavaComputer scienceMulti-agent systemstrictfpOperating systemcomputer.software_genreJava virtual machinecomputerHeap (data structure)Garbage collectioncomputer.programming_language
researchProduct

Graph grammar engineering: A software specification method

1987

Graphs as conceptual data models are accepted and used in a wide range of different problem areas. Giving some examples we outline common aspects for modeling complex structures by graphs. We present a formal frame-work based on graph grammars to specify graph classes and the corresponding graph manipulations. We show that such a specification can be written in a systematic, engineering-like manner. This is achieved by an extension of the known programmed, attributed graph grammars. Node-set operators are introduced to facilitate graph queries. Concepts like abstraction, decomposition, refinement, parameterization, and integration have been adopted from software engineering to yield a compr…

Software visualizationbusiness.industryComputer scienceProgramming languageSearch-based software engineeringSoftware developmentSoftware requirements specificationcomputer.software_genreSoftware sizingSoftware constructionSoftware designbusinesscomputerSoftware verification
researchProduct

New Trends in Databases and Information Systems: Contributions from ADBIS 2017 Workshops

2017

In the last few years, research on database and information system technologies has been rapidly evolving thanks to the new paradigms of software and hardware adopted by modern scientific and more invasive applications. A huge and heterogeneous amount of data should be efficiently stored, managed, and analyzed exploiting proper technologies for such novel and more interesting data-driven applications. New and cutting-edge research challenges arise that have been attracting great attention from both academia and industry. The 21st European Conference on Advances in Databases and Information Systems (ADBIS 2017), held on September 24–27, 2017 in Nicosia, Cyprus includes four thematic workshop…

SoftwareDatabaseComputer sciencebusiness.industryInformation systembusinesscomputer.software_genrecomputer
researchProduct

Learning temporal patterns for anomaly intrusion detection

2002

For the last decade an explosive spread of computer systems and computer networks has resulted in a society that is increasingly dependent on information stored on these systems. A computer system connected to the network is accessible from another computer in this network regardless of its geographical position. Along with providing many benefits for legitimate users this technology creates almost unlimited opportunities for malicious persons, which using software vulnerabilities may successfully penetrate the networked computer systems. In order to eliminate potential devastating consequences caused by breaches in computer systems, more and more attention is drawn to the information secur…

SoftwareOrder (exchange)Network securitybusiness.industryComputer scienceVulnerabilityPattern matchingIntrusion detection systemInformation securityComputer securitycomputer.software_genrebusinesscomputerProceedings of the 2002 ACM symposium on Applied computing
researchProduct

Honeypot Utilization for Network Intrusion Detection

2018

For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…

Software_OPERATINGSYSTEMSDictionary attackHoneypotComputer science020206 networking & telecommunications02 engineering and technology021001 nanoscience & nanotechnologycomputer.software_genreComputer securityLoginComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringMalwareNetwork intrusion detection0210 nano-technologycomputerSecurity system
researchProduct

Mobile Security with Location-Aware Role-Based Access Control

2012

Published version of an article from the book: Security and privacy in mobile information and communication systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-30244-2_15 This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC c…

Software_OPERATINGSYSTEMSMarkup languagebusiness.industryComputer scienceSeparation of dutiesXACMLComputerApplications_COMPUTERSINOTHERSYSTEMSAccess controlComputer securitycomputer.software_genreFirewall (construction)Software deploymentVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Role-based access controlbusinesscomputerMobile deviceComputer networkcomputer.programming_language
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…

Software_OPERATINGSYSTEMSpassword security behaviorrepetitionComputer sciencepassword memorabilityHuman Factors and ErgonomicsComputer securitycomputer.software_genreEducationPassword strengthmuistaminenPasswordta113AuthenticationRepetition (rhetorical device)turvallisuusGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securityHardware and Architectureuser conveniencekäyttäjäkokemuscomputerpassword verificationSoftwareInternational Journal of Human-Computer Studies
researchProduct