Sciweavers

Share
916 search results - page 183 / 184
» Dynamical evolution analysis of the object-oriented software...
Sort
View
CIKM
2007
Springer
9 years 7 months ago
Just-in-time contextual advertising
Contextual Advertising is a type of Web advertising, which, given the URL of a Web page, aims to embed into the page (typically via JavaScript) the most relevant textual ads avail...
Aris Anagnostopoulos, Andrei Z. Broder, Evgeniy Ga...
INFOCOM
2000
IEEE
9 years 5 months ago
Topology Discovery in Heterogeneous IP Networks
Abstract— Knowledge of the up-to-date physical topology of an IP network is crucial to a number of critical network management tasks, including reactive and proactive resource ma...
Yuri Breitbart, Minos N. Garofalakis, Cliff Martin...
ATVA
2008
Springer
144views Hardware» more  ATVA 2008»
9 years 3 months ago
Tests, Proofs and Refinements
1 : Logic in Specification and Verification (abstract) Natarajan Shankar (SRI) Session Chair : Sungdeok Cha 12 : 00 13 : 00 Lunch 13 : 00 15 : 00 2 : Boolean Modeling of Cell Biolo...
Sriram K. Rajamani
SIMULATION
2010
150views more  SIMULATION 2010»
8 years 8 months ago
Profiling Literature in Healthcare Simulation
: The publications that relate to the application of simulation to healthcare have steadily increased over the years. These publications are scattered amongst various journals that...
Navonil Mustafee, Korina Katsaliaki, Simon J. E. T...
CCS
2007
ACM
9 years 5 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
books