Sciweavers

3123 search results - page 575 / 625
» Focusing on pattern matching
Sort
View
SCESM
2006
ACM
262views Algorithms» more  SCESM 2006»
15 years 3 months ago
Scenario-driven modeling and validation of requirements models
Requirements models for large systems typically cannot be developed in a single step, but evolve in a sequence of iterations. We have developed such an iterative modeling process ...
Christian Seybold, Silvio Meier, Martin Glinz
SIGCOMM
2006
ACM
15 years 3 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
ICITA
2005
IEEE
15 years 3 months ago
A Web Redirection Service for Variant Chinese Domain Name Resolution
Many efforts in past years have been made to lower the linguistic barriers for non-native English speakers to access the Internet. IDNA [2] focuses on access to Internationalized ...
Jeng-Wei Lin, Li-Ming Tseng, Jan-Ming Ho, Feipei L...
CIKM
2005
Springer
15 years 3 months ago
Query workload-aware overlay construction using histograms
Peer-to-peer (p2p) systems offer an efficient means of data sharing among a dynamically changing set of a large number of autonomous nodes. Each node in a p2p system is connected...
Georgia Koloniari, Yannis Petrakis, Evaggelia Pito...
FOSSACS
2005
Springer
15 years 3 months ago
Model Checking for Nominal Calculi
Nominal calculi have been shown very effective to formally model a variety of computational phenomena. The models of nominal calculi have often infinite states, thus making model ...
Gian Luigi Ferrari, Ugo Montanari, Emilio Tuosto