Sciweavers

2266 search results - page 367 / 454
» How Not to Evaluate a Developmental System
Sort
View
142
Voted
FGIT
2009
Springer
15 years 11 months ago
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sti...
YoungHan Choi, TaeGhyoon Kim, SeokJin Choi, CheolW...
FM
2009
Springer
155views Formal Methods» more  FM 2009»
15 years 11 months ago
Towards an Operational Semantics for Alloy
Abstract. The Alloy modeling language has a mathematically rigorous denotational semantics based on relational algebra. Alloy specifications often represent operations on a state,...
Theophilos Giannakopoulos, Daniel J. Dougherty, Ka...
204
Voted
IFIP
2009
Springer
15 years 11 months ago
Network Awareness in P2P-TV Applications
The increasing popularity of applications for video-streaming based on P2P paradigm (P2P-TV) is raising the interest of both broadcasters and network operators. The former see a pr...
Stefano Traverso, Emilio Leonardi, Marco Mellia, M...
184
Voted
DEBS
2009
ACM
15 years 11 months ago
Processing publish/subscribe queries over distributed data streams
We address the problem of processing continuous multi-join queries, over distributed data streams, making use of existing work in the field of publish/subscribe systems. We show ...
Oana Jurca, Sebastian Michel, Alexandre Herrmann, ...
125
Voted
CCGRID
2008
IEEE
15 years 11 months ago
Admission Control in a Computational Market
We propose, implement and evaluate three admission models for computational Grids. The models take the expected demand into account and offer a specific performance guarantee. Th...
Thomas Sandholm, Kevin Lai, Scott H. Clearwater