Sciweavers

817 search results - page 118 / 164
» Malware behaviour analysis
Sort
View
FIW
2003
15 years 1 months ago
Representing New Voice Services and Their Features
New voice services are investigated in the fields of Internet telephony (SIP – Session Initiation Protocol) and interactive voice systems (VoiceXML – Voice Extended Markup La...
Kenneth J. Turner
SCS
2003
15 years 1 months ago
Safety Assurance Contracts for Integrated Modular Avionics
This paper describes a method for performing safety analysis on an Integrated Modular Avionics system in a manner which supports the incremental development and change of system c...
Philippa Conmy, Mark Nicholson, John A. McDermid
ICMAS
1998
15 years 1 months ago
An Adaptive Choice of Messaging Protocol in Multi Agent Systems
abstract, form of this problem, we use a mathematical analysis to show that three different messaging protocols result in varying message loads, depending on certain parameters suc...
Chris Preist, Siani Pearson
UAI
1993
15 years 1 months ago
On reasoning in networks with qualitative uncertainty
In this paper some initialwork towards a new approach to qualitative reasoning under uncertainty is presented. This method is not only applicable to qualitative probabilistic reas...
Simon Parsons, E. H. Mamdani
CORR
2010
Springer
108views Education» more  CORR 2010»
14 years 12 months ago
Constraint solvers: An empirical evaluation of design decisions
This paper presents an evaluation of the design decisions made in four state-of-the-art constraint solvers; Choco, ECLiPSe, Gecode, and Minion. To assess the impact of design deci...
Lars Kotthoff