412,287 Hits in 6.4 sec

Detecting Meta-Patterns from Frameworks Using Hybrid Genetic Algorithm

Tapan Kant, Manjari Gupta, Anil Kumar Tripathi, Meeta Prakash
2018 International Journal of Engineering & Technology  
The present study is an attempt to develop a genetic algorithm approach for detecting the types and numbers of meta-patterns.  ...  Meta-patterns are a sort of basic object-oriented constructs that have been used to design an object-oriented framework.  ...  [15] used graph theoretical approach to model design patterns into graph and applied decomposition algorithm to detect design patterns. Bernardi et al.  ... 
doi:10.14419/ijet.v7i2.20.16732 fatcat:cykj6456irfvrns2dy4n24ztvq

A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks [chapter]

Giorgio Giacinto, Fabio Roli, Luca Didaci
2003 Lecture Notes in Computer Science  
In this paper, a pattern recognition approach to network intrusion detection based on the fusion of multiple classifiers is proposed.  ...  In particular, a modular Multiple Classifier architecture is designed, where each module detects intrusions against one of the services offered by the protected network.  ...  These patterns allow testing the ability of the pattern recognition approach to detect novel attack types.  ... 
doi:10.1007/3-540-44938-8_35 fatcat:pix3ce5f6vaidj3jqtjp3mjj5y

Design Pattern Detection Using Similarity Scoring

Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides, Spyros Halkidis
2006 IEEE Transactions on Software Engineering  
The identification of design patterns as part of the reengineering process can convey important information to the designer.  ...  In this paper, a design pattern detection methodology is proposed that is based on similarity scoring between graph vertices.  ...  The main power of an approach based on the notion of elemental design patterns is the ability to detect a design pattern after "refactorings" [13] have been applied to it.  ... 
doi:10.1109/tse.2006.112 fatcat:vb34yq5qgnegngfdociofv265y

Reverse engineering with the reclipse tool suite

Markus von Detten, Matthias Meyer, Dietrich Travkin
2010 Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - ICSE '10  
We present Reclipse, a reverse engineering tool suite for static and dynamic design pattern detection in combination with a pattern candidate rating used to assess the detection results' reliability.  ...  Design pattern detection is a reverse engineering methodology that helps software engineers to analyze and understand legacy software by recovering its design and thereby aiding in the preparation of re-engineering  ...  Several approaches for the detection of design pattern implementations have been developed, most of which apply a static, structural source code analysis.  ... 
doi:10.1145/1810295.1810360 dblp:conf/icse/DettenMT10 fatcat:iltesfbarbhllad2v4p3yujhyu

A survey of intrusion detection in wireless network applications

Robert Mitchell, Ing-Ray Chen
2014 Computer Communications  
Our approach is to classify existing contemporary wireless intrusion detection system (IDS) techniques based on target wireless network, detection technique, collection process, trust model and analysis  ...  In order to identify gaps and propose research directions in wireless network intrusion detection research, we survey the literature of this area.  ...  Pattern matching analysis techniques A pattern matching approach simply scans an input source.  ... 
doi:10.1016/j.comcom.2014.01.012 fatcat:24cujhgddrfppnbrtqy4u7xvm4

Fusion of multiple classifiers for intrusion detection in computer networks

Giorgio Giacinto, Fabio Roli, Luca Didaci
2003 Pattern Recognition Letters  
In this paper, a pattern recognition approach to network intrusion detection based on the fusion of multiple classifiers is proposed.  ...  Intrusion Detection Systems aim at detecting intruders who elude "first line" protection.  ...  pattern recognition approach to intrusion detection (Elkan, 2000) .  ... 
doi:10.1016/s0167-8655(03)00004-7 fatcat:uy4xsymkevh4xpwpbriuan7rs4


2005 Advances in Bioinformatics and Its Applications  
Supervised pattern discovery techniques have been successfully used for motif detection. However, this requires the use of an efficient training set.  ...  We present a new strategy for designing good training sets that uses phylogenetic trees to automatically reduce the bias in training sets.  ...  In this paper we show how to design good training sets for motif detection based on pattern discovery.  ... 
doi:10.1142/9789812702098_0022 fatcat:dpoewwszijaexhsb6g43t2rc3a

A Novel Local Network Intrusion Detection System Based on Support Vector Machine

2011 Journal of Computer Science  
Second, the new method to recognized attack patterns which may give better coverage and make the detection more effective.  ...  Approach: Intrusion detection system for local area network by using Support Vector Machines (SVM) was proposed.  ...  This design approach usually results in an inflexible detection system that is unable to detect an attack if the sequence of events is slightly different from the predefined profile (Wahid and Zulkarnain  ... 
doi:10.3844/jcssp.2011.1560.1564 fatcat:lhsk4o7ai5aj5pfbgxbd4gu7cy

Using Design Pattern Clues to Improve the Precision of Design Pattern Detection Tools

Francesca Arcelli Fontana, Marco Zanoni, Stefano Maggioni
2011 Journal of Object Technology  
From this observation, we introduce an approach based on micro structures detection that aims to discard the false positives from the detected results, hence improving the precision of the analyzed tools  ...  Design pattern detection, or rather the detection of structures that match design patterns, is useful for reverse engineering, program comprehension and for design recovery as well as for re-documenting  ...  Acknowledgments We would like to kindly thank the reviewers for their very useful comments and suggestions for improving the paper.  ... 
doi:10.5381/jot.2011.10.1.a4 fatcat:ipubh7uxhzej3c24tzahjrnru4

Developing Anti Spyware System using Design Patterns

Mohamed Adel Sheta, Mohamed Zaki, Kamel El Hadad, H. M.
2015 International Conference on Aerospace Sciences and Aviation Technology  
In this paper we introduce a framework for anti spyware system that combine data mining and design patterns in detecting and classifying spyware.  ...  These approaches were successful in detecting known spyware but have proven failure in detecting unknown spyware.  ...  The proposed anti spyware approach In the proposed approach data mining will be combined with design patterns method in an integrated anti spyware system.  ... 
doi:10.21608/asat.2015.23003 fatcat:4yitvu7ryzfr5cd5z4j46mivq4

Model-driven detection of Design Patterns

Mario Luca Bernardi, Giuseppe Antonio Di Lucca
2010 2010 IEEE International Conference on Software Maintenance  
In this paper an approach is presented to automatically detect Design Patterns in existing Object Oriented systems by tracing system's source code components to the roles they play in the Patterns.  ...  The approach allows to detect also Pattern variants, defined by overriding the Pattern structural properties. The approach was applied to some open-source systems to validate it.  ...  INTRODUCTION In this paper we propose an approach to detect the Design Patterns (DPs) [1] implemented in an Object Oriented (OO) system by identifying the source components coding them.  ... 
doi:10.1109/icsm.2010.5609740 dblp:conf/icsm/BernardiL10 fatcat:x3fyggdfkjh2tiq5oih3xdtdte

Accurate lithography hotspot detection based on PCA-SVM classifier with hierarchical data clustering

Jhih-Rong Gao, Bei Yu, David Z. Pan, John L. Sturtevant, Luigi Capodieci
2014 Design-Process-Technology Co-optimization for Manufacturability VIII  
In this paper, we propose an accurate hotspot detection approach based on PCA (principle component analysis)-SVM (support vector machine) classifier.  ...  As technology nodes continues shrinking, layout patterns become more sensitive to lithography processes, resulting in lithography hotspots that need to be identified and eliminated during physical verification  ...  Acknowledgment The authors would like to thank Dr. Tetsuaki Matsunawa at Toshiba (currently a visiting scholar at UT Austin) for helpful discussion.  ... 
doi:10.1117/12.2045888 fatcat:rsgbs3ldjnb27ekodquuzfmupm

A model-driven graph-matching approach for design pattern detection

Mario Luca Bernardi, Marta Cimitile, Giuseppe Antonio Di Lucca
2013 2013 20th Working Conference on Reverse Engineering (WCRE)  
In this paper an approach to automatically detect Design Patterns (DPs) in Object Oriented systems is presented.  ...  It allows to link system's source code components to the roles they play in each pattern.  ...  CONCLUSIONS AND FUTURE WORK An approach to detect design patterns in OO systems has been presented and discussed.  ... 
doi:10.1109/wcre.2013.6671292 dblp:conf/wcre/BernardiCL13 fatcat:kmljxusldrestkbfwyvu4m7mkq

Chip Optimization Through STI-Stress-Aware Placement Perturbations and Fill Insertion

Andrew B. Kahng, Puneet Sharma, Rasit Onur Topaloglu
2008 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
The experimental results show that our method is promising: for benchmark designs in 90nm and 65nm technologies, 100% of bridging and open hotspots are detected with few falsely detected hotspots.  ...  The golden verification signoff tool using simulationbased approach has occupied the mainstream and has been able to detect hotspots accurately.  ...  Footnote 4: The commercial tool needs to confirm whether patterns detected by our DG are truly detected hotspots or falsely detected hotspots.  ... 
doi:10.1109/tcad.2008.923083 fatcat:gg24uo5t2vdlvh6745vjqjqzie

Modernized Intrusion Detection Using Enhanced Apriori Algorithm

Lalli, Palanisamy
2013 International Journal of Wireless & Mobile Networks  
In this paper, we proposed to design a modernized intrusion detection system which consist of two methods such as anomaly and misuse detection.  ...  Our system proposed to discover temporal pattern of attacker behaviors, which is profiled using an algorithm EAA (Enhanced Apriori Algorithm).  ...  In this paper we proposed to design and develop an intelligent data mining intrusion detection system and its core part a composite detection engine with anomaly detection and misuse detection features  ... 
doi:10.5121/ijwmn.2013.5206 fatcat:tciiycxpezdoxlbatix2y722hy
« Previous Showing results 1 — 15 out of 412,287 results