Sciweavers

1027 search results - page 25 / 206
» Callgraph properties of executables
Sort
View
ATAL
2004
Springer
15 years 6 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
ICWS
2009
IEEE
15 years 18 days ago
From Workflow Models to Executable Web Service Interfaces
Workflow models have been used and refined for years to execute processes within organisations. To deal with collaborative processes (choreographies) these internal workflow model...
Armin Haller, Mateusz Marmolowski, Walid Gaaloul, ...
MOBIHOC
2005
ACM
16 years 2 months ago
Temporal properties of low power wireless links: modeling and implications on multi-hop routing
Recently, several studies have analyzed the statistical properties of low power wireless links in real environments, clearly demonstrating the differences between experimentally o...
Alberto Cerpa, Jennifer L. Wong, Miodrag Potkonjak...
GECCO
2008
Springer
129views Optimization» more  GECCO 2008»
15 years 4 months ago
Searching for liveness property violations in concurrent systems with ACO
Liveness properties in concurrent systems are, informally, those properties that stipulate that something good eventually happens during execution. In order to prove that a given ...
Enrique Alba, J. Francisco Chicano
WWW
2005
ACM
16 years 3 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham