Sciweavers

8196 search results - page 1414 / 1640
» Computational Modeling and Complexity Science
Sort
View
DALT
2004
Springer
15 years 9 months ago
A Protocol for Resource Sharing in Norm-Governed Ad Hoc Networks
Ad hoc networks may be viewed as computational systems whose members may fail to, or choose not to, comply with the rules governing their behaviour. We are investigating to what ex...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt, Mare...
ISOLA
2004
Springer
15 years 9 months ago
Designing Safe, Reliable Systems using Scade
As safety critical systems increase in size and complexity, the need for efficient tools to verify their reliability grows. In this paper we present a tool that helps engineers des...
Parosh Aziz Abdulla, Johan Deneaux, Gunnar St&arin...
EUROSEC
2010
ACM
15 years 9 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
RTCSA
2003
IEEE
15 years 9 months ago
Towards Aspectual Component-Based Development of Real-Time Systems
Increasing complexity of real-time systems, and demands for enabling their configurability and tailorability are strong motivations for applying new software engineering principle...
Aleksandra Tesanovic, Dag Nyström, Jörge...
CPM
1999
Springer
92views Combinatorics» more  CPM 1999»
15 years 8 months ago
Physical Mapping with Repeated Probes: The Hypergraph Superstring Problem
We focus on the combinatorial analysis of physical mapping with repeated probes. We present computational complexity results, and we describe and analyze an algorithmic strategy. W...
Serafim Batzoglou, Sorin Istrail
« Prev « First page 1414 / 1640 Last » Next »