Sciweavers

817 search results - page 111 / 164
» Malware behaviour analysis
Sort
View
GLOBECOM
2007
IEEE
15 years 10 months ago
Output Traffic Characterization of Policers and Shapers with Long-Range Dependent Input Traffic
 Long-range dependence (LRD) is a largely verified property of Internet traffic, which severely affects network queuing. An approach for guaranteeing performance requirements is...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...
AIIA
2007
Springer
15 years 10 months ago
'O Francesca, ma che sei grulla?' Emotions and Irony in Persuasion Dialogues
In this paper we investigated the interaction between emotional and non-emotional aspects of persuasion dialogues, from the viewpoint of both the system (the Persuader), when reaso...
Irene Mazzotta, Nicole Novielli, Vincenzo Silvestr...
ECTEL
2007
Springer
15 years 10 months ago
Profiled Search Methods for e-Learning Systems
Most currently used e-Learning Systems do not often offer search functionality. Even if methods are provided to search for Learning Objects (LOs), they don’t usually utilize info...
Tomasz Orzechowski, Sebastian Ernst, Andrzej Dziec...
IFM
2007
Springer
104views Formal Methods» more  IFM 2007»
15 years 10 months ago
Probabilistic Timed Behavior Trees
The Behavior Tree notation has been developed as a method for systematically and traceably capturing user requirements. In this paper we extend the notation with probabilistic beha...
Robert Colvin, Lars Grunske, Kirsten Winter
SCAM
2006
IEEE
15 years 10 months ago
Comparative Study of Refactoring Haskell and Erlang Programs
Refactoring is about changing the design of existing code without changing its behaviour, but with the aim of making code easier to understand, modify, or reuse. Taking Haskell an...
Huiqing Li, Simon Thompson