Sciweavers

246 search results - page 46 / 50
» Joinpoint Inference from Behavioral Specification to Impleme...
Sort
View
LISA
2007
14 years 3 days ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
BMCBI
2008
139views more  BMCBI 2008»
13 years 10 months ago
New challenges for text mining: mapping between text and manually curated pathways
Background: Associating literature with pathways poses new challenges to the Text Mining (TM) community. There are three main challenges to this task: (1) the identification of th...
Kanae Oda, Jin-Dong Kim, Tomoko Ohta, Daisuke Okan...
LCN
2008
IEEE
14 years 4 months ago
WBest: A bandwidth estimation tool for IEEE 802.11 wireless networks
—Bandwidth estimation techniques seek to provide an accurate estimation of available bandwidth such that network applications can adjust their behavior accordingly. However, most...
Mingzhe Li, Mark Claypool, Robert E. Kinicki
MBEES
2010
13 years 11 months ago
Towards Architectural Programming of Embedded Systems
: Integrating architectural elements with a modern programming language is essential to ensure a smooth combination of architectural design and programming. In this position statem...
Arne Haber, Jan Oliver Ringert, Bernhard Rumpe
MABS
2005
Springer
14 years 3 months ago
Visual Modeling for Complex Agent-Based Simulation Systems
Currently there is a diversity of tools for agent-based simulation, which can be applied to the understanding of social phenomena. Describing this kind of phenomena with a visual l...
Candelaria Sansores, Juan Pavón, Jorge J. G...