Sciweavers

1682 search results - page 304 / 337
» A behavior model for persuasive design
Sort
View
MMB
2010
Springer
194views Communications» more  MMB 2010»
15 years 6 months ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt
SSR
2001
104views more  SSR 2001»
15 years 3 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
BMCBI
2008
160views more  BMCBI 2008»
15 years 2 months ago
Dynamic sensitivity analysis of biological systems
Background: A mathematical model to understand, predict, control, or even design a real biological system is a central theme in systems biology. A dynamic biological system is alw...
Wu Hsiung Wu, Feng Sheng Wang, Maw Shang Chang
TLDI
2009
ACM
155views Formal Methods» more  TLDI 2009»
15 years 10 months ago
Opis: reliable distributed systems in OCaml
The importance of distributed systems is growing as computing devices become ubiquitous and bandwidth becomes plentiful. Concurrency and distribution pose algorithmic and implemen...
Pierre-Évariste Dagand, Dejan Kostic, Vikto...
IWIA
2005
IEEE
15 years 7 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp