Sciweavers

7124 search results - page 1290 / 1425
» Programming Languages and Operating Systems
Sort
View
IJCSA
2006
95views more  IJCSA 2006»
13 years 10 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
JCM
2008
75views more  JCM 2008»
13 years 10 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
CANDC
2004
ACM
13 years 10 months ago
Identification of related gene/protein names based on an HMM of name variations
Gene and protein names follow few, if any, true naming conventions and are subject to great variation in different occurrences of the same name. This gives rise to two important p...
Lana Yeganova, Lawrence H. Smith, W. John Wilbur
COLING
2010
13 years 5 months ago
EMMA: A novel Evaluation Metric for Morphological Analysis
We present a novel Evaluation Metric for Morphological Analysis (EMMA) that is both linguistically appealing and empirically sound. EMMA uses a graphbased assignment algorithm, op...
Sebastian Spiegler, Christian Monson
NSPW
2003
ACM
14 years 3 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
« Prev « First page 1290 / 1425 Last » Next »