Sciweavers

2560 search results - page 392 / 512
» Analysis Tool for Honeypot Systems
Sort
View
100
Voted
CSFW
2009
IEEE
15 years 8 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
ICPADS
1994
IEEE
15 years 6 months ago
Stochastic Modeling of Scaled Parallel Programs
Testingthe performance scalabilityof parallelprograms can be a time consuming task, involving many performance runs for different computer configurations, processor numbers, and p...
Allen D. Malony, Vassilis Mertsiotakis, Andreas Qu...
BPM
2006
Springer
166views Business» more  BPM 2006»
15 years 5 months ago
Process Mining by Measuring Process Block Similarity
Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent year. Workflow precedence graph and workflow block structures are two i...
Joonsoo Bae, James Caverlee, Ling Liu, Hua Yan
145
Voted
BMCBI
2010
143views more  BMCBI 2010»
15 years 2 months ago
ETE: a python Environment for Tree Exploration
Background: Many bioinformatics analyses, ranging from gene clustering to phylogenetics, produce hierarchical trees as their main result. These are used to represent the relations...
Jaime Huerta-Cepas, Joaquín Dopazo, Toni Ga...
79
Voted
TVCG
2010
116views more  TVCG 2010»
15 years 7 days ago
Streak Lines as Tangent Curves of a Derived Vector Field
—Characteristic curves of vector fields include stream, path, and streak lines. Stream and path lines can be obtained by a simple vector field integration of an autonomous ODE ...
Tino Weinkauf, Holger Theisel