Sciweavers

190 search results - page 14 / 38
» P Systems, Petri Nets, and Program Machines
Sort
View
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
14 years 1 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
USS
2010
13 years 5 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
CORR
2011
Springer
195views Education» more  CORR 2011»
13 years 2 months ago
Abstract Processes of Place/Transition Systems
Processes of Place/Transition Systems6 Rob van Glabbeeka,b , Ursula Goltzc , Jens-Wolfhard Schickec aNICTA, Sydney, Australia bSchool of Computer Science and Engineering, Universit...
Rob J. van Glabbeek, Ursula Goltz, Jens-Wolfhard S...
ICES
2003
Springer
79views Hardware» more  ICES 2003»
14 years 23 days ago
Using Genetic Programming to Generate Protocol Adaptors for Interprocess Communication
Abstract. As mobile devices become more powerful, interprocess communication becomes increasingly more important. Unfortunately, this larger freedom of mobility gives rise to unkno...
Werner Van Belle, Tom Mens, Theo D'Hondt
EDOC
2007
IEEE
14 years 1 months ago
Getting Rid of the OR-Join in Business Process Models
Abstract— In practice, the development of process-aware information systems suffers from a gap between conceptual business process models and executable workflow specifications...
Jan Mendling, Boudewijn F. van Dongen, Wil M. P. v...