Sciweavers

9842 search results - page 1877 / 1969
» Compositional timing analysis
Sort
View
CCS
2004
ACM
14 years 3 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
EGOV
2004
Springer
14 years 3 months ago
Software Acquisition Based on Business Models
In this paper, we present an approach based on hierarchically structured business models as artifacts of business process modeling that are used in a stepwise acquisition process f...
Peter Regner, Thomas Wiesinger, Josef Küng, R...
GECCO
2004
Springer
164views Optimization» more  GECCO 2004»
14 years 3 months ago
Fuzzy Dominance Based Multi-objective GA-Simplex Hybrid Algorithms Applied to Gene Network Models
Hybrid algorithms that combine genetic algorithms with the Nelder-Mead simplex algorithm have been effective in solving certain optimization problems. In this article, we apply a s...
Praveen Koduru, Sanjoy Das, Stephen Welch, Judith ...
IFIP
2004
Springer
14 years 3 months ago
High Throughput Route Selection in Multi-rate Ad Hoc Wireless Networks
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens
INEX
2004
Springer
14 years 3 months ago
The Interactive Track at INEX 2004
An interactive track was included in INEX for the first time in 2004. The main aim of the track was to study the behaviour of searchers when interacting with components of XML doc...
Anastasios Tombros, Birger Larsen, Saadia Malik
« Prev « First page 1877 / 1969 Last » Next »