Sciweavers

1486 search results - page 195 / 298
» Firewall Rules Analysis
Sort
View
WSC
2008
15 years 6 months ago
The APIOBPCS Deziel and Eilon parameter configuration in supply chain under progressive information sharing strategies
The aim of this paper is to investigate how different smoothing parameter levels of the Automatic Pipeline Inventory and Order Based Production Control System smoothing replenishm...
Salvatore Cannella, Elena Ciancimino
AMAST
2008
Springer
15 years 6 months ago
Explaining Verification Conditions
The Hoare approach to program verification relies on the construction and discharge of verification conditions (VCs) but offers no support to trace, analyze, and understand the VCs...
Ewen Denney, Bernd Fischer 0002
ATAL
2008
Springer
15 years 6 months ago
Characterizing effective auction mechanisms: insights from the 2007 TAC market design competition
This paper analyzes the entrants to the 2007 TAC Market Design competition. It presents a classification of the entries to the competition, and uses this classification to compare...
Jinzhong Niu, Kai Cai, Simon Parsons, Enrico Gerdi...
ATVA
2008
Springer
86views Hardware» more  ATVA 2008»
15 years 6 months ago
NetQi: A Model Checker for Anticipation Game
Abstract. NetQi is a freely available model-checker designed to analyze network incidents such as intrusion. This tool is an implementation of the anticipation game framework, a va...
Elie Bursztein
DIS
2008
Springer
15 years 5 months ago
Constructing Iceberg Lattices from Frequent Closures Using Generators
Frequent closures (FCIs) and generators (FGs) as well as the precedence relation on FCIs are key components in the definition of a variety of association rule bases. Although their...
Laszlo Szathmary, Petko Valtchev, Amedeo Napoli, R...