Sciweavers

817 search results - page 148 / 164
» Malware behaviour analysis
Sort
View
IJBC
2007
137views more  IJBC 2007»
13 years 7 months ago
Patterns of oscillation in a Ring of Identical Cells with Delayed Coupling
We investigate the behaviour of a neural network model consisting of three neurons with delayed self and nearest-neighbour connections. We give analytical results on the existence...
Sharene D. Bungay, Sue Ann Campbell
IJSNET
2007
95views more  IJSNET 2007»
13 years 7 months ago
On extracting consistent graphs in wireless sensor networks
: Robustness and security of services like localisation, routing and time synchronisation in Wireless Sensor Networks (WSNs) have been critical issues. Efficient mathematical (gra...
Murtuza Jadliwala, Qi Duan, Jinhui Xu, Shambhu J. ...
TCOM
2008
131views more  TCOM 2008»
13 years 7 months ago
Accurate estimation of the Hurst parameter of long-range dependent traffic using modified Allan and Hadamard variances
Abstract--Internet traffic exhibits self-similarity and longrange dependence (LRD) on various time scales. In this paper, we propose to use the Modified Allan Variance (MAVAR) and ...
Stefano Bregni, Luca Jmoda
ISF
2007
105views more  ISF 2007»
13 years 7 months ago
COSMO: A conceptual framework for service modelling and refinement
This paper presents a conceptual framework for service modelling and refinement, called the COSMO (COnceptual Service MOdelling) framework. This framework provides concepts to mode...
Dick A. C. Quartel, Maarten W. A. Steen, Stanislav...
JWSR
2007
106views more  JWSR 2007»
13 years 7 months ago
Architecture-Driven Service Discovery for Service Centric Systems
: Service discovery has been recognised as an important aspect in the development of service centric systems, i.e., software systems which deploy web services. To develop such syst...
Alexander Kozlenkov, George Spanoudakis, Andrea Zi...