Sciweavers

825 search results - page 150 / 165
» Internal Iteration Externalized
Sort
View
CMS
2006
13 years 9 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis
DAGSTUHL
2006
13 years 9 months ago
Modeling and Simulating Biological Processes with Stochastic Multiset Rewriting
ed Abstract Membrane systems are models of computation inspired by the structure and the function of biological cells. The model was introduced in 1998 by Gh. Paun and since then m...
Matteo Cavaliere, Sean Sedwards
FLAIRS
2006
13 years 9 months ago
Cognitive Simulation in Virtual Patients
We present an overview of the Virtual Patient project at the University of Maryland, which is developing a cognitive model of humans experiencing various states of health and dise...
Sergei Nirenburg, Marjorie McShane, Stephen Beale,...
IQ
2001
13 years 9 months ago
Information Envelope and its Information Integrity Implications
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Vijay V. Mandke, Madhavan K. Nayar, Kamna Malik
IADIS
2003
13 years 9 months ago
Information Management and Interoperability Strategies: The Case for Digital Identifiers
The move from the current compartmentalised systems into an interoperable environment is the central challenge facing digital development this decade. In the quest for a semantic ...
Robin Wilson