Sciweavers

12741 search results - page 75 / 2549
» Editorial and call for papers
Sort
View
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 9 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
CORR
2008
Springer
84views Education» more  CORR 2008»
13 years 9 months ago
Nested Ordered Sets and their Use for Data Modelling
In this paper we present a new approach to data modelling, called the concept-oriented model (CoM), and describe its main features and characteristics including data semantics and ...
Alexandr A. Savinov
INFSOF
1998
73views more  INFSOF 1998»
13 years 8 months ago
Restructuring programs by tucking statements into functions
Changing the internal structure of a program without changing its behavior is called restructuring. This paper presents a transformation called tuck for restructuring programs by ...
Arun Lakhotia, Jean-Christophe Deprez
MASS
2010
110views Communications» more  MASS 2010»
13 years 6 months ago
SpartanRPC: Secure WSN middleware for cooperating domains
In this paper we describe SpartanRPC, a secure middleware technology for wireless sensor network (WSN) applications supporting cooperation between distinct protection domains. The ...
Peter C. Chapin, Christian Skalka
CORR
2011
Springer
187views Education» more  CORR 2011»
13 years 4 months ago
The Language Features and Architecture of B-Prolog
B-Prolog is a high-performance implementation of the standard Prolog language with several extensions including matching clauses, action rules for event handling, finite-domain c...
Neng-Fa Zhou