Sciweavers

2403 search results - page 262 / 481
» Similarity of Event Sequences
Sort
View
CSFW
2007
IEEE
14 years 2 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
CONEXT
2008
ACM
14 years 17 days ago
Adapting TFRC to mobile networks with frequent disconnections
In the context of mobile and pervasive networking, it is not uncommon to experience frequent loss of connectivity. Congestion control algorithms usually mistake resulting packets ...
Olivier Mehani, Roksana Boreli
EPK
2004
122views Management» more  EPK 2004»
14 years 5 days ago
Transformation of ARIS Markup Language to EPML
: Heterogeneous and proprietary interchange formats pose a major problem for business process management. This applies in particular to processes that have been modelled as Event-D...
Jan Mendling, Markus Nüttgens
DMIN
2006
132views Data Mining» more  DMIN 2006»
14 years 5 days ago
An Overview of Associative Classifiers
Abstract-- Associative classification is a new classification approach integrating association mining and classification. It becomes a significant tool for knowledge discovery and ...
Yanmin Sun, Andrew K. C. Wong, Yang Wang 0007
CCR
2004
80views more  CCR 2004»
13 years 10 months ago
An analysis of TCP reset behaviour on the internet
This paper presents a one-year study of Internet packet traffic from a large campus network, showing that 15-25% of TCP connections have at least one TCP RST (reset). Similar resu...
Martin F. Arlitt, Carey L. Williamson