Sciweavers

1400 search results - page 174 / 280
» On multiplication in finite fields
Sort
View
AICT
2006
IEEE
210views Communications» more  AICT 2006»
14 years 4 months ago
Model-Based Analysis of Obligations in Web Service Choreography
In this paper we discuss a model-based approach to the analysis of service interactions for coordinated web service compositions using obligation policies specified in the form of...
Howard Foster, Sebastián Uchitel, Jeff Mage...
AINA
2010
IEEE
14 years 2 months ago
The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS
—Network Intrusion Detection System (NIDS) is a system which can detect network attacks resulted from worms and viruses on the Internet. An efficient pattern matching algorithm p...
Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su
RTAS
1999
IEEE
14 years 2 months ago
Scalable Scheduling Support for Loss and Delay Constrained Media Streams
Real-time media servers need to service hundreds and, possibly, thousands of clients, each with their own quality of service (QoS) requirements. To guarantee such diverse QoS requ...
Richard West, Karsten Schwan, Christian Poellabaue...
ESOP
2007
Springer
14 years 2 months ago
Scalar Outcomes Suffice for Finitary Probabilistic Testing
Abstract. The question of equivalence has long vexed research in concurrency, leading to many different denotational- and bisimulation-based approaches; a breakthrough occurred wit...
Yuxin Deng, Rob J. van Glabbeek, Carroll Morgan, C...
COLT
2006
Springer
14 years 1 months ago
Learning Rational Stochastic Languages
Given a finite set of words w1, . . . , wn independently drawn according to a fixed unknown distribution law P called a stochastic language, an usual goal in Grammatical Inference ...
François Denis, Yann Esposito, Amaury Habra...