Sciweavers

1486 search results - page 89 / 298
» Firewall Rules Analysis
Sort
View
ECMDAFA
2005
Springer
130views Hardware» more  ECMDAFA 2005»
15 years 9 months ago
Control Flow Analysis of UML 2.0 Sequence Diagrams
This article presents a control flow analysis methodology based on UML 2.0 sequence diagrams (SD). In contrast to the conventional code-based control flow analysis techniques, thi...
Vahid Garousi, Lionel C. Briand, Yvan Labiche
112
Voted
COCOON
2009
Springer
15 years 10 months ago
On Smoothed Analysis of Quicksort and Hoare's Find
We provide a smoothed analysis of Hoare’s find algorithm and we revisit the smoothed analysis of quicksort. Hoare’s find algorithm – often called quickselect – is an easy...
Mahmoud Fouz, Manfred Kufleitner, Bodo Manthey, Ni...
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 10 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
BMCBI
2007
94views more  BMCBI 2007»
15 years 3 months ago
A structural analysis of in vitro catalytic activities of hammerhead ribozymes
Background: Ribozymes are small catalytic RNAs that possess the dual functions of sequencespecific RNA recognition and site-specific cleavage. Trans-cleaving ribozymes can inhibit...
Yu Shao, Susan Wu, Chi Yu Chan, Jessie R. Klapper,...
PODC
2012
ACM
13 years 6 months ago
Brief announcement: a calculus of policy-based routing systems
The BGP (Border Gateway Protocol) is the single inter-domain routing protocol that enables network operators within each autonomous system (AS) to influence routing decisions by ...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...