Sciweavers

2957 search results - page 265 / 592
» Code analysis and CS-XML
Sort
View
DSS
2007
75views more  DSS 2007»
15 years 3 months ago
Short Term and Total Life Impact analysis of email worms in computer systems
This paper develops a methodology for analyzing and predicting the impact category of malicious code, particularly email worms. The current paper develops two frameworks to classi...
Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. ...
JOT
2007
102views more  JOT 2007»
15 years 3 months ago
Type Access Analysis: Towards Informed Interface Design
Programs designed from scratch often start with just a set of classes. Classes can be instantiated and so deliver the objects that are the carriers of information and function. In...
Friedrich Steimann, Philip Mayer
TWC
2008
127views more  TWC 2008»
15 years 3 months ago
Energy-Delay Analysis of MAC Protocols in Wireless Networks
In this paper the tradeoff between energy and delay for wireless networks is studied. A network using a request-to-send (RTS) and clear-to-send (CTS) type medium access control (M...
Shih Yu Chang, Wayne E. Stark, Achilleas Anastasop...
157
Voted
TNN
1998
254views more  TNN 1998»
15 years 3 months ago
Comparative analysis of fuzzy ART and ART-2A network clustering performance
—Adaptive resonance theory (ART) describes a family of self-organizing neural networks, capable of clustering arbitrary sequences of input patterns into stable recognition codes....
T. Frank, Karl-Friedrich Kraiss, Torsten Kuhlen
PE
2007
Springer
140views Optimization» more  PE 2007»
15 years 3 months ago
Stochastic analysis of file-swarming systems
File swarming (or file sharing) is one of the most important applications in P2P networks. In this paper, we propose a stochastic framework to analyze a file swarming system und...
Minghong Lin, Bin Fan, John C. S. Lui, Dah-Ming Ch...