Sciweavers

3725 search results - page 567 / 745
» DLP System Description
Sort
View
ENTCS
2008
110views more  ENTCS 2008»
15 years 4 months ago
Game-Based Probabilistic Predicate Abstraction in PRISM
ion in PRISM1 Mark Kattenbelt Marta Kwiatkowska Gethin Norman David Parker Oxford University Computing Laboratory, Oxford, UK Modelling and verification of systems such as communi...
Mark Kattenbelt, Marta Z. Kwiatkowska, Gethin Norm...
IANDC
2008
128views more  IANDC 2008»
15 years 4 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
JCSS
2008
159views more  JCSS 2008»
15 years 4 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
KAIS
2008
151views more  KAIS 2008»
15 years 4 months ago
Expertise-based peer selection in Peer-to-Peer networks
Abstract. Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining th...
Peter Haase, Ronny Siebes, Frank van Harmelen
JTAER
2006
70views more  JTAER 2006»
15 years 4 months ago
Australian Franchisor websites: Moving towards network behaviour
Australia is one of the leading nations using the internet in both business-to-consumer (B2C) and business-tobusiness (B2B) settings (ABS 2004). However, little academic attention...
Sally Rao, Lorelle Frazer