Sciweavers

2357 search results - page 159 / 472
» Computing Refactorings of Behavior Models
Sort
View
EMSOFT
2005
Springer
15 years 10 months ago
SHIM: a deterministic model for heterogeneous embedded systems
— Typical embedded hardware/software systems are implemented using a combination of C and an HDL such as Verilog. While each is well-behaved in isolation, combining the two gives...
Stephen A. Edwards, Olivier Tardieu
144
Voted
IWIA
2003
IEEE
15 years 9 months ago
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
STOC
2000
ACM
112views Algorithms» more  STOC 2000»
15 years 9 months ago
A random graph model for massive graphs
We propose a random graph model which is a special case of sparse random graphs with given degree sequences. This model involves only a small number of parameters, called logsize ...
William Aiello, Fan R. K. Chung, Linyuan Lu
151
Voted
AAAI
2004
15 years 6 months ago
Agent-Based Modeling with Social Networks for Terrorist Recruitment
The Seldon model combines concepts from agent-based modeling and social network analysis to create a computation model of social dynamics for terrorist recruitment. The underlying...
Teresa H. Ko, Nina M. Berry
EUMAS
2006
15 years 6 months ago
Agent Capability: Automating the Design to Code Process
Current IT application domains such as web services and autonomic computing call for highly flexible systems, able to automatically adapt to changing operational environments as w...
Loris Penserini, Anna Perini, Angelo Susi, John My...