Sciweavers

4131 search results - page 778 / 827
» Compactness in Topology and Computation
Sort
View
CAV
2007
Springer
108views Hardware» more  CAV 2007»
15 years 8 months ago
Systematic Acceleration in Regular Model Checking
Abstract. Regular model checking is a form of symbolic model checking technique for systems whose states can be represented as finite words over a finite alphabet, where regular ...
Bengt Jonsson, Mayank Saksena
VIZSEC
2007
Springer
15 years 8 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
WEA
2007
Springer
114views Algorithms» more  WEA 2007»
15 years 8 months ago
Improving Tree Search in Phylogenetic Reconstruction from Genome Rearrangement Data
Abstract. A major task in evolutionary biology is to determine the ancestral relationships among the known species, a process generally referred as phylogenetic reconstruction. In ...
Fei Ye, Yan Guo, Andrew Lawson, Jijun Tang
ICDCS
2006
IEEE
15 years 8 months ago
ASAP: an AS-Aware Peer-Relay Protocol for High Quality VoIP
Peer-to-peer (P2P) technology has been successfully applied in Internet telephony or Voice over Internet Protocol (VoIP), such as the Skype system, where P2P is used for both sear...
Shansi Ren, Lei Guo, Xiaodong Zhang
IPPS
2006
IEEE
15 years 8 months ago
A simulation study of the effects of multi-path approaches in e-commerce applications
Response time is a key factor of any e-Commerce application, and a set of solutions have been proposed to provide low response time despite network congestions or failures. Being ...
Paolo Romano, Francesco Quaglia, Bruno Ciciani