Sciweavers

8177 search results - page 51 / 1636
» Detecting System Emulators
Sort
View
IJNSEC
2006
162views more  IJNSEC 2006»
13 years 9 months ago
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically ins...
Asad Amir Pirzada, Chris McDonald
DATE
2006
IEEE
118views Hardware» more  DATE 2006»
14 years 3 months ago
Design and implementation of a modular and portable IEEE 754 compliant floating-point unit
Multimedia and communication algorithms from embedded system domain often make extensive use of floating-point arithmetic. Due to the complexity and expense of the floating-poin...
Kingshuk Karuri, Rainer Leupers, Gerd Ascheid, Hei...
ECOWS
2011
Springer
12 years 8 months ago
Automating the Generation of Web Service Testbeds Using AOP
Abstract—One of the key concepts of service-oriented computing is dynamic binding which favors on-demand integration of services into a running system. Companies can outsource ta...
Lukasz Juszczyk, Schahram Dustdar
DMIN
2006
123views Data Mining» more  DMIN 2006»
13 years 10 months ago
Novel Evaluation Framework of Intrusion Detection Systems with Respect to Security Policies
Intrusion Detection System is an integral component of the computer security infrastructure. It is usually put in place to detect computer security policy violations. While its ro...
Negmat Mullodzhanov
DEXA
2009
Springer
70views Database» more  DEXA 2009»
14 years 3 months ago
On the Termination Problem for Declarative XML Message Processing
Abstract. We define a formal syntax and semantics for the Rule Definition Language (RDL) of DemaqLite, which is a fragment of the declarative XML message processing system Demaq....
Tadeusz Litak, Sven Helmer