Sciweavers

7064 search results - page 67 / 1413
» From States to Histories
Sort
View
IPPS
2007
IEEE
14 years 4 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
ICDCSW
2006
IEEE
14 years 4 months ago
The Key Knob
Locks are mechanical fastening devices used on various kinds of objects like doors and vehicles, and they can be released using a certain type of key. They have a long history, fr...
Alois Ferscha, Clemens Holzmann, Stefan Resmerita
IWPC
2006
IEEE
14 years 4 months ago
Building Usage Contexts During Program Comprehension
Software developers often work on multiple simultaneous projects. Even when only a single project is underway, everyday distractions interrupt the development effort. Consequently...
Chris Parnin, Carsten Görg
LPAR
2005
Springer
14 years 3 months ago
Deciding Separation Logic Formulae by SAT and Incremental Negative Cycle Elimination
Separation logic is a subset of the quantifier-free first order logic. It has been successfully used in the automated verification of systems that have large (or unbounded) inte...
Chao Wang, Franjo Ivancic, Malay K. Ganai, Aarti G...
DEXAW
2003
IEEE
168views Database» more  DEXAW 2003»
14 years 3 months ago
Visualisation of (Distributed) Process Execution based on Extended BPMN
In order to create, share and improve knowledge on business processes, humans need a common, readable and preferably visual notation. So far, a lot of effort has been put into vis...
Mariusz Momotko, Bartosz Nowicki