Sciweavers

1061 search results - page 153 / 213
» A general definition of malware
Sort
View
ISTA
2004
15 years 1 months ago
TransM: A Structured Document Transformation Model
: We present in this paper a transformation model for structured documents. TransM is a new model that deals with specified documents, where the structure conforms to a predefined ...
Nouhad Amaneddine, Jean Paul Bahsoun, Jean-Paul Bo...
FLAIRS
2003
15 years 1 months ago
Decision Evaluation of Three Flood Management Strategies
This article describes the application of computational decision analytic techniques for a national policy decision. It constitutes an example of the increasing use of modern comp...
Mats Danielson, Love Ekenberg, Jim Johansson
ISPE
2003
15 years 1 months ago
Enterprise modelling and the UML: (sometimes) a conflict without a case
: Nowadays, the UML language is one of the most widely accepted software modelling language. Enterprise modelling is concerned with the externalisation of knowledge about the en...
G. Berio, M. Petit
SODA
1998
ACM
99views Algorithms» more  SODA 1998»
15 years 1 months ago
Online Throughput-Competitive Algorithm for Multicast Routing and Admission Control
We present the first polylog-competitive online algorithm for the general multicast admission control and routing problem in the throughput model. The ratio of the number of reque...
Ashish Goel, Monika Rauch Henzinger, Serge A. Plot...
VDB
1998
275views Database» more  VDB 1998»
15 years 1 months ago
Building Metaphors for Supporting User Interaction with Multimedia Databases
In this paper we discuss how metaphors for supporting user interaction with multimedia databases can be automatically generated. The work presented is a further step in the develo...
Maria Francesca Costabile, Donato Malerba, Matthia...