Sciweavers

89 search results - page 15 / 18
» Implementing Services by Partial State Machines
Sort
View
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 7 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
POPL
2012
ACM
12 years 3 months ago
Deciding choreography realizability
Since software systems are becoming increasingly more concurrent and distributed, modeling and analysis of interactions among their components is a crucial problem. In several app...
Samik Basu, Tevfik Bultan, Meriem Ouederni
BMCBI
2007
121views more  BMCBI 2007»
13 years 7 months ago
Predicting zinc binding at the proteome level
Background: Metalloproteins are proteins capable of binding one or more metal ions, which may be required for their biological function, for regulation of their activities or for ...
Andrea Passerini, Claudia Andreini, Sauro Menchett...
SOFSEM
2007
Springer
14 years 1 months ago
Deterministic Simulation of a NFA with k -Symbol Lookahead
We investigate deterministically simulating (i.e., solving the membership problem for) nondeterministic finite automata (NFA), relying solely on the NFA’s resources (states and ...
Bala Ravikumar, Nicolae Santean
IJFCS
2007
105views more  IJFCS 2007»
13 years 7 months ago
On the Existence of Lookahead Delegators for NFA
We investigate deterministically simulating (i.e., solving the membership problem for) nondeterministic finite automata (NFA), relying solely on the NFA’s resources (states and...
Bala Ravikumar, Nicolae Santean