Sciweavers

2500 search results - page 73 / 500
» Specifying Behavior in C
Sort
View
SIGCOMM
2006
ACM
14 years 3 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...
ECBS
2000
IEEE
97views Hardware» more  ECBS 2000»
14 years 1 months ago
Ensuring Structure and Behavior Correctness in Design Composition
The design of a large component-based software system typically involves the composition of different components. Instead of relying on a free composition of components, we advoca...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
GROUP
2007
ACM
14 years 1 months ago
Evaluating tagging behavior in social bookmarking systems: metrics and design heuristics
To improve existing social bookmarking systems and to design new ones, researchers and practitioners need to understand how to evaluate tagging behavior. In this paper, we analyze...
Umer Farooq, Thomas George Kannampallil, Yang Song...
E4MAS
2006
Springer
14 years 1 months ago
Enhancing the Environment with a Law-Governed Service for Monitoring and Enforcing Behavior in Open Multi-Agent Systems
Environment is an essential part of any multi-agent system (MAS), since it provides the surrounding conditions for agents to exist. For some sort of systems, the environment can be...
Rodrigo B. de Paes, Gustavo R. de Carvalho, Ma&iac...
RAID
2000
Springer
14 years 27 days ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...