Sciweavers

4307 search results - page 258 / 862
» Dynamic Spyware Analysis
Sort
View
96
Voted
AINA
2007
IEEE
15 years 7 months ago
Experimental analysis of peer-to-peer streaming in cellular networks
In this paper, we study the adequacy of applying peer-topeer techniques to mobile networks by conducting a series of experiments using smart phones as peers. We measure important ...
Almudena Diaz-Zayas, Pedro Merino, Laura Panizo, A...
ITCC
2005
IEEE
15 years 6 months ago
An Analysis of Notification Related Specifications for Web/Grid Applications
Notification is especially important in the Service Oriented Architecture (SOA) model engendered by Web Services. where Web Services interact with each other through the exchange ...
Shrideep Pallickara, Geoffrey Fox
96
Voted
ICCS
2005
Springer
15 years 6 months ago
Bifurcation Analysis of Large Equilibrium Systems in Matlab
The Continuation of Invariant Subspaces (CIS) algorithm produces a smoothly varying basis for an invariant subspace R(s) of a parameter-dependent matrix A(s). In the case when A(s)...
David Bindel, James Demmel, Mark J. Friedman, Will...
102
Voted
KES
2005
Springer
15 years 6 months ago
Learning Within the BDI Framework: An Empirical Analysis
One of the limitations of the BDI (Belief-Desire-Intention) model is the lack of any explicit mechanisms within the architecture to be able to learn. In particular, BDI agents do n...
Toan Phung, Michael Winikoff, Lin Padgham
100
Voted
ICPPW
2003
IEEE
15 years 6 months ago
Performance Analysis of Approximate String Searching Implementations for Heterogeneous Computing Platform
This paper presents an analytical performance prediction model that can be used to predict the speedup and similar performance metrics of four approximate string searching implemen...
Panagiotis D. Michailidis, Konstantinos G. Margari...