Sciweavers

9873 search results - page 1677 / 1975
» Emergent Semantics Systems
Sort
View
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
15 years 11 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
LICS
2008
IEEE
15 years 11 months ago
Nonlocal Flow of Control and Kleene Algebra with Tests
Kleene algebra with tests (KAT) is an equational system for program verification that combines Kleene algebra (KA), or the algebra of regular expressions, with Boolean algebra. I...
Dexter Kozen
MOMPES
2008
IEEE
15 years 11 months ago
Architectural Concurrency Equivalence with Chaotic Models
During its lifetime, embedded systems go through multiple changes to their runtime architecture. That is, threads, processes, and processor are added or removed to/from the softwa...
Dionisio de Niz
QEST
2008
IEEE
15 years 11 months ago
Approximate Analysis of Probabilistic Processes: Logic, Simulation and Games
We tackle the problem of non robustness of simulation and bisimulation when dealing with probabilistic processes. It is important to ignore tiny deviations in probabilities becaus...
Josée Desharnais, François Laviolett...
EDOC
2007
IEEE
15 years 11 months ago
Getting Rid of the OR-Join in Business Process Models
Abstract— In practice, the development of process-aware information systems suffers from a gap between conceptual business process models and executable workflow specifications...
Jan Mendling, Boudewijn F. van Dongen, Wil M. P. v...
« Prev « First page 1677 / 1975 Last » Next »