Sciweavers

9210 search results - page 1504 / 1842
» Analyzing Real-Time Systems
Sort
View
ICTAI
2008
IEEE
15 years 11 months ago
Discovering Program's Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Frequent patterns in program executions represent recurring sequences of events. These patterns can be used to reveal the hidden structures of a program, and ease the comprehensio...
Chunying Zhao, Keven Ates, Jun Kong, Kang Zhang
IEEEARES
2008
IEEE
15 years 11 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
INFOCOM
2008
IEEE
15 years 11 months ago
Achieving Honest Ratings with Reputation-Based Fines in Electronic Markets
—The effectiveness of online feedback mechanisms for rating the performance of providers in electronic markets is vulnerable to the submission of dishonest ratings. In this paper...
Thanasis G. Papaioannou, George D. Stamoulis
INFOCOM
2008
IEEE
15 years 11 months ago
Decentralized Rate Regulation in Random Access Channels
—We consider a time-slotted multipacket reception channel, shared by a finite number of mobile users who transmit to a common base station. Each user is allocated a fixed data ...
Ishai Menache, Nahum Shimkin
IPPS
2008
IEEE
15 years 11 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu
« Prev « First page 1504 / 1842 Last » Next »