Sciweavers

9316 search results - page 156 / 1864
» Analysis of traceback techniques
Sort
View
120
Voted
SEC
2004
15 years 5 months ago
Spam Filter Analysis
Unsolicited bulk email (aka. spam) is a major problem on the Internet. To counter spam, several techniques, ranging from spam filters to mail protocol extensions like hashcash, hav...
Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Ni...
RTCSA
1999
IEEE
15 years 8 months ago
Pipeline Timing Analysis Using a Trace-Driven Simulator
In this paper we present a technique for Worst-Case Execution Time WCET analysis for pipelined processors. Our technique uses a standard simulator instead of special-purpose pipel...
Jakob Engblom, Andreas Ermedahl
107
Voted
CSREAEEE
2006
82views Business» more  CSREAEEE 2006»
15 years 5 months ago
User-Website Interactive Communication Analysis in Web-Based Information System Development
- Web-based information systems (WBIS) include the website part and the system part, and easy-to-use website is particular critical to the success of WBIS. This paper argues that t...
Ying Liang
CORR
2010
Springer
178views Education» more  CORR 2010»
15 years 2 months ago
Towards A Shape Analysis for Graph Transformation Systems
Graphs and graph transformation systems are a frequently used modelling technique for a wide range of different domains, covering areas as diverse as refactorings, network topolog...
Dominik Steenken, Heike Wehrheim, Daniel Wonisch
TAP
2010
Springer
132views Hardware» more  TAP 2010»
15 years 9 months ago
Relational Analysis of (Co)inductive Predicates, (Co)algebraic Datatypes, and (Co)recursive Functions
This paper presents techniques for applying a finite relational model finder to logical specifications that involve (co)inductive predicates, (co)algebraic datatypes, and (co)re...
Jasmin Christian Blanchette