Sciweavers

1795 search results - page 274 / 359
» Security Models and Information Flow
Sort
View
FOCS
2004
IEEE
14 years 23 days ago
Stochastic Optimization is (Almost) as easy as Deterministic Optimization
Stochastic optimization problems attempt to model uncertainty in the data by assuming that (part of) the input is specified in terms of a probability distribution. We consider the...
David B. Shmoys, Chaitanya Swamy
KDD
2007
ACM
154views Data Mining» more  KDD 2007»
14 years 9 months ago
An event-based framework for characterizing the evolutionary behavior of interaction graphs
Interaction graphs are ubiquitous in many fields such as bioinformatics, sociology and physical sciences. There have been many studies in the literature targeted at studying and m...
Sitaram Asur, Srinivasan Parthasarathy, Duygu Ucar
CEEMAS
2007
Springer
14 years 3 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ICWE
2005
Springer
14 years 2 months ago
The Role of Visual Tools in a Web Application Design and Verification Framework: A Visual Notation for LTL Formulae
As the Web becomes a platform for implementing complex B2C and B2B applications, there is a need to extend Web conceptual modeling to process-centric applications. In this context,...
Marco Brambilla, Alin Deutsch, Liying Sui, Victor ...
MABS
2004
Springer
14 years 2 months ago
Layering Social Interaction Scenarios on Environmental Simulation
For an integrated simulation such as the natural environment affected by human society, it is indispensable to provide an integrated simulator that incorporates multiple computatio...
Daisuke Torii, Toru Ishida, Stéphane Bonnea...