Sciweavers

136 search results - page 18 / 28
» Complexity Results for 1-safe Nets
Sort
View
WECWIS
1999
IEEE
102views ECommerce» more  WECWIS 1999»
13 years 12 months ago
Monitoring and Prediction of Network Performance
Analysis of network and application pegormance is traditionally based on mathematical models derived from first principles. Such models are usually complex, diflcult to use, and d...
Bjorn Frogner, Alexander B. Cannara
ISPD
2012
ACM
288views Hardware» more  ISPD 2012»
12 years 3 months ago
Construction of realistic gate sizing benchmarks with known optimal solutions
Gate sizing in VLSI design is a widely-used method for power or area recovery subject to timing constraints. Several previous works have proposed gate sizing heuristics for power ...
Andrew B. Kahng, Seokhyeong Kang
DIAL
2004
IEEE
156views Image Analysis» more  DIAL 2004»
13 years 11 months ago
Xed: A New Tool for eXtracting Hidden Structures from Electronic Documents
PDF became a very common format for exchanging printable documents. Further, it can be easily generated from the major documents formats, which make a huge number of PDF documents...
Karim Hadjar, Maurizio Rigamonti, Denis Lalanne, R...
CSL
2006
Springer
13 years 11 months ago
Visibly Pushdown Automata: From Language Equivalence to Simulation and Bisimulation
Abstract. We investigate the possibility of (bi)simulation-like preorder/equivalence checking on the class of visibly pushdown automata and its natural subclasses visibly BPA (Basi...
Jirí Srba
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 27 days ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...