Sciweavers

922 search results - page 169 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
SAC
2008
ACM
13 years 7 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
WWW
2003
ACM
14 years 8 months ago
Design, implementation, and evaluation of a client characterization driven web server
In earlier work we proposed a way for a Web server to detect connectivity information about clients accessing it in order to take tailored actions for a client request. This paper...
Balachander Krishnamurthy, Yin Zhang, Craig E. Wil...
EUROSYS
2008
ACM
14 years 5 months ago
Modeling viral economies for digital media
Financial efficiency is the premier performance measure for most systems. Existing economic ecosystems for distribution of multimedia leave a lot to be desired: client-server plat...
Shan He, Renan G. Cattelan, Darko Kirovski
ISSTA
2004
ACM
14 years 1 months ago
Verifying process models built using parameterized state machines
Software process and workflow languages are increasingly used to define loosely-coupled systems of systems. These languages focus on coordination issues such as data flow and c...
Barbara Staudt Lerner
NDSS
2009
IEEE
14 years 2 months ago
Scalable, Behavior-Based Malware Clustering
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a m...
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hla...