Sciweavers

1317 search results - page 239 / 264
» A new delay system approach to network-based control
Sort
View
RAID
2005
Springer
14 years 1 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
CCO
2001
Springer
168views Combinatorics» more  CCO 2001»
14 years 5 days ago
Mathematical Programming Models and Formulations for Deterministic Production Planning Problems
Abstract. We study in this lecture the literature on mixed integer programming models and formulations for a specific problem class, namely deterministic production planning probl...
Yves Pochet
FASE
2008
Springer
13 years 9 months ago
A Formal Framework for Developing Adaptable Service-Based Applications
Web services are open, interoperable, easy to integrate and reuse, and are extensively used in many application domains. Research and best practices have produced excellent support...
Leen Lambers, Leonardo Mariani, Hartmut Ehrig, Mau...
BIOWIRE
2007
Springer
14 years 1 months ago
User-Centric Mobility Models for Opportunistic Networking
Abstract. In this chapter we survey the most recent proposals for modelling user mobility in mobile pervasive networks, and specifically in opportunistic networks. We identify two...
Chiara Boldrini, Marco Conti, Andrea Passarella
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 9 months ago
Rewriting Regular XPath Queries on XML Views
We study the problem of answering queries posed on virtual views of XML documents, a problem commonly encountered when enforcing XML access control and integrating data. We approa...
Wenfei Fan, Floris Geerts, Xibei Jia, Anastasios K...