Sciweavers

927 search results - page 27 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
IFIPTCS
2010
15 years 1 months ago
Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility
Most highly dynamic infrastructure-less networks have in common that the assumption of connectivity does not necessarily hold at a given instant. Still, communication routes can be...
Arnaud Casteigts, Paola Flocchini, Bernard Mans, N...
SECURWARE
2008
IEEE
15 years 10 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...
HUMAN
2003
Springer
15 years 9 months ago
A Study on Monitoring and Protecting Computer System against Interception Threat
Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has no...
Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo C...
SYNASC
2005
IEEE
84views Algorithms» more  SYNASC 2005»
15 years 9 months ago
Membrane Computing as a Framework for Modeling Economic Processes
Abstract. This paper is a first step towards a systematic evaluation of the possibilities to use membrane computing as a modeling framework for economics. Membrane computing is a ...
Gheorghe Paun, Radu A. Paun
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
15 years 9 months ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner