Sciweavers

533 search results - page 98 / 107
» Protocol synthesis from timed and structured specifications
Sort
View
GI
2008
Springer
13 years 12 months ago
A Novel Conceptual Model for Accessing Distributed Data and Applications, as well as Devices
: As data and services are increasingly distributed in the network, rather than stored in a fixed location, one can imagine a scenario in which the Personal Computer, intended as a...
Lucia Terrenghi, Thomas Lang
BMCBI
2006
130views more  BMCBI 2006»
13 years 11 months ago
An interactive visualization tool to explore the biophysical properties of amino acids and their contribution to substitution ma
Background: Quantitative descriptions of amino acid similarity, expressed as probabilistic models of evolutionary interchangeability, are central to many mainstream bioinformatic ...
Blazej Bulka, Marie desJardins, Stephen J. Freelan...
SCP
2010
155views more  SCP 2010»
13 years 9 months ago
Type inference and strong static type checking for Promela
The SPIN model checker and its specification language Promela have been used extensively in industry and academia to check logical properties of distributed algorithms and protoc...
Alastair F. Donaldson, Simon J. Gay
MIDDLEWARE
2010
Springer
13 years 9 months ago
FaReCast: Fast, Reliable Application Layer Multicast for Flash Dissemination
Abstract. To disseminate messages from a single source to a large number of targeted receivers, a natural approach is the tree-based application layer multicast (ALM). However, in ...
Kyungbaek Kim, Sharad Mehrotra, Nalini Venkatasubr...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 11 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...