Sciweavers

1027 search results - page 25 / 206
» Callgraph properties of executables
Sort
View
ATAL
2004
Springer
14 years 2 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
ICWS
2009
IEEE
13 years 8 months ago
From Workflow Models to Executable Web Service Interfaces
Workflow models have been used and refined for years to execute processes within organisations. To deal with collaborative processes (choreographies) these internal workflow model...
Armin Haller, Mateusz Marmolowski, Walid Gaaloul, ...
MOBIHOC
2005
ACM
14 years 10 months ago
Temporal properties of low power wireless links: modeling and implications on multi-hop routing
Recently, several studies have analyzed the statistical properties of low power wireless links in real environments, clearly demonstrating the differences between experimentally o...
Alberto Cerpa, Jennifer L. Wong, Miodrag Potkonjak...
GECCO
2008
Springer
129views Optimization» more  GECCO 2008»
14 years 13 hour ago
Searching for liveness property violations in concurrent systems with ACO
Liveness properties in concurrent systems are, informally, those properties that stipulate that something good eventually happens during execution. In order to prove that a given ...
Enrique Alba, J. Francisco Chicano
WWW
2005
ACM
14 years 11 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham