Sciweavers

4307 search results - page 520 / 862
» Dynamic Spyware Analysis
Sort
View
SIGCOMM
1996
ACM
15 years 8 months ago
End-to-end Routing Behavior in the Internet
The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exceptions being Chinoy's analysis of the dynamics of Internet routing in...
Vern Paxson
163
Voted
ICDAR
1995
IEEE
15 years 7 months ago
Handwritten word recognition for real-time applications
—A fast method of handwritten word recognition suitable for real time applications is presented in this paper. Preprocessing, segmentation and feature extraction are implemented ...
Gyeonghwan Kim, Venu Govindaraju
WSC
2008
15 years 6 months ago
Using data driven simulation to build inventory model
Many general-purpose simulation languages (such as ARENA, SLAM II, GPSS/H, SIMAN etc) have been the major simulation tools to simulate the demand-supply processes. They have made ...
Minghui Yang
ECAI
2008
Springer
15 years 6 months ago
Temporal Logic Patterns for Querying Qualitative Models of Genetic Regulatory Networks
Formal verification based on model checking provides a powerful technology to query qualitative models of dynamical systems. The application of model-checking approaches is hamper...
Pedro T. Monteiro, Delphine Ropers, Radu Mateescu,...
ICONIP
2008
15 years 5 months ago
Synchronization Transition in a Pair of Coupled Non-identical Oscillators
Abstract. We study synchronization phenomena in a pair of integrateand-fire (IF) oscillators with the width of an action potential. They have slightly different periodic firings ea...
Yasuomi D. Sato, Yuji Tanaka, Masatoshi Shiino