Sciweavers

752 search results - page 134 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
HICSS
1996
IEEE
165views Biometrics» more  HICSS 1996»
15 years 3 months ago
Advanced Distributed Simulation through the Aggregate Level Simulation Protocol
The venerable problem solving technique of simulation finds itself inthe midstof a revolution. Where once it was regarded as a "technique of last resort" for systems ana...
Richard M. Weatherly, Annette L. Wilson, Bradford ...
FMCAD
2004
Springer
15 years 3 months ago
Bloom Filters in Probabilistic Verification
Abstract. Probabilistic techniques for verification of finite-state transition systems offer huge memory savings over deterministic techniques. The two leading probabilistic scheme...
Peter C. Dillinger, Panagiotis Manolios
90
Voted
ECIS
2004
15 years 1 months ago
Measurement of user-perceived web quality
Web sites are now considered an extension of the entire business, not just an additional channel or storefront or a simple information portal for the company. Creating an effectiv...
Ravi T. Seethamraju
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
15 years 9 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
WCRE
1999
IEEE
15 years 4 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...