Sciweavers

817 search results - page 51 / 164
» Malware behaviour analysis
Sort
View
CAAN
2004
Springer
15 years 5 months ago
Limits and Power Laws of Models for the Web Graph and Other Networked Information Spaces
We consider a generalized copy model of the web graph and related networks, and analyze its limiting behaviour. The model is motivated by previously proposed copying models of the ...
Anthony Bonato, Jeannette C. M. Janssen
PPDP
2001
Springer
15 years 4 months ago
When Do Bounds and Domain Propagation Lead to the Same Search Space?
This paper explores the question of when two propagationbased constraint systems have the same behaviour, in terms of search space. We categorise the behaviour of domain and bound...
Christian Schulte, Peter J. Stuckey
EUROMICRO
2006
IEEE
15 years 5 months ago
Real-Time Modelling of Distributed Component-Based Applications
This paper presents a modular modelling methodology to formulate the timing behaviour of real-time distributed component-based applications. It allows to build real-time models of...
Patricia López Martínez, Julio L. Me...
SAC
2005
ACM
15 years 5 months ago
Using object-level run-time metrics to study coupling between objects
In this paper we present an investigation into the run-time behaviour of objects in Java programs, using specially adapted coupling metrics. We identify objects from the same clas...
Áine Mitchell, James F. Power
JUCS
2008
153views more  JUCS 2008»
14 years 11 months ago
Quality of Experience in Communications Ecosystem
: Communications ecosystem covers a huge area from technical issues to business models and human behaviour. Due to this extreme diversity various societies need to discuss with eac...
Kalevi Kilkki