Sciweavers

1061 search results - page 158 / 213
» A general definition of malware
Sort
View
IJDAR
2006
103views more  IJDAR 2006»
14 years 12 months ago
Table-processing paradigms: a research survey
Tables are a ubiquitous form of communication. While everyone seems to know what a table is, a precise, analytical definition of "tabularity" remains elusive because some...
David W. Embley, Matthew Hurst, Daniel P. Lopresti...
JCO
2008
85views more  JCO 2008»
14 years 12 months ago
Locating and detecting arrays for interaction faults
The identification of interaction faults in component-based systems has focussed on indicating the presence of faults, rather than their location and magnitude. While this is a va...
Charles J. Colbourn, Daniel W. McClary
ITSSA
2006
89views more  ITSSA 2006»
14 years 12 months ago
A Methodology for Classifying Self-Organizing Software Systems
: The software industry is faced with the fast growing complexity of IT infrastructures. This makes manual administration increasingly difficult and appears to be the limiting fact...
Klaus Herrmann, Matthias Werner, Gero Mühl
ML
2008
ACM
14 years 11 months ago
Unrestricted pure call-by-value recursion
Call-by-value languages commonly restrict recursive definitions by only allowing functions and syntactically explicit values in the right-hand sides. As a consequence, some very a...
Johan Nordlander, Magnus Carlsson, Andy Gill
NA
2008
78views more  NA 2008»
14 years 11 months ago
A walk through energy, discrepancy, numerical integration and group invariant measures on measurable subsets of euclidean space
(A) The celebrated Gaussian quadrature formula on finite intervals tells us that the Gauss nodes are the zeros of the unique solution of an extremal problem. We announce recent re...
S. B. Damelin