Sciweavers

1501 search results - page 238 / 301
» Towards Integration of Modeling Methods for Cyber-Physical S...
Sort
View
ISF
2008
114views more  ISF 2008»
15 years 4 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
ICASSP
2008
IEEE
15 years 10 months ago
On-demand new word learning using world wide web
Most of the Web-based methods for lexicon augmenting consist in capturing global semantic features of the targeted domain in order to collect relevant documents from the Web. We s...
Stanislas Oger, Georges Linares, Fréd&eacut...
IFM
2000
Springer
104views Formal Methods» more  IFM 2000»
15 years 7 months ago
Structuring Real-Time Object-Z Specifications
This paper presents a means of structuring specifications in real-time Object-Z: an integration of Object-Z with the timed refinement calculus. Incremental modification of classes ...
Graeme Smith, Ian J. Hayes
JDCTA
2008
128views more  JDCTA 2008»
15 years 4 months ago
Specifying a WS-ECA Working Framework for Ubiquitous Web Services in Object-Process Methodology
The Web Services-Event-Condition-Action (WSECA) framework is designed to enable the heterogeneous communication devices in Ubiquitous Computing Environments to achieve inter-opera...
Haining Lee, Jaeil Park, Peom Park, Dongmin Shin
142
Voted
CPC
2000
93views more  CPC 2000»
15 years 3 months ago
Fast Unimodular Counting
This paper describes methods for counting the number of non-negative integer solutions of the system Ax = b when A is a non-negative totally unimodular matrix and b an integral ve...
John Mount