Now showing items 11-20 of 55
Multi-tenant architectures in the cloud: a systematic mapping study
(IEEE, 345 E 47Th St, New York, Ny 10017 USA, 2017)
Unlike traditional web applications, cloud-based applications can provide services for large number of tenants using the same hardware and software by implementing multi-tenant architectures. 407 papers have been examined ...
Neural network based intrusion detection systems with different training functions
(IEEE, 345 E 47th St, New York, Ny 10017 USA, 2018)
In the last decades, due to the improvements in networking techniques and the increased use of the Internet, the digital communications entered all of the activities in the global marketplace. Parallel to these enhancements ...
Third-Degree B-spline solution for a nonlinear diffusion Fisher’xxs equation
Non-linear Fisher’s equations are solved by using a spline method based on B-spline in the space direction and finite difference schema in the time direction. Numerical results reveal that spline method based on Bspline is ...
A Systematic Mapping Study on Software Architecture Recovery
In this study, we investigated the approaches used in software architecture recovery papers, identify the current status of paper distributions in terms of year, publication channel, electronic databases, and journals. ...
Genetic algorithm for intrusion detection systemGenetik Algoritma ile Saldırı Tespit Sistemi
(IEEE, 345 E 47th St, New York, Ny 10017 USA, 2016)
Intrusion detection systems are systems that prevent or slow the serving of different types of server data traffic caused by intensive use of networks that spread by internet. Particularly in recent years, because of ...