Sciweavers

817 search results - page 65 / 164
» Malware behaviour analysis
Sort
View
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Analysis of a gossip protocol in PRISM
Gossip protocols have been proposed as a robust and efficient method for disseminating information throughout dynamically changing networks. We present an analysis of a gossip pro...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
IEAAIE
2011
Springer
14 years 3 months ago
An Agent Model for Computational Analysis of Mirroring Dysfunctioning in Autism Spectrum Disorders
Persons with an Autism Spectrum Disorder (ASD) may show certain types of deviations in social functioning. Since the discovery of mirror neuron systems and their role in social fun...
Yara van der Laan, Jan Treur
MABS
2004
Springer
15 years 5 months ago
Simulation and Analysis of Shared Extended Mind
Some types of animals exploit patterns created in the environment as external mental states, thus obtaining an extension of their mind. In the case of social animals the creation a...
Tibor Bosse, Catholijn M. Jonker, Martijn C. Schut...
CDC
2009
IEEE
138views Control Systems» more  CDC 2009»
15 years 4 months ago
Bilevel programming for analysis of low-complexity control of linear systems with constraints
— In this paper we use bilevel programming to find the maximum difference between a reference controller and a low-complexity controller in terms of the infinitynorm difference...
Henrik Manum, Colin Neil Jones, Johan Löfberg...
JAVA
2001
Springer
15 years 4 months ago
Platform independent dynamic Java virtual machine analysis: the Java Grande Forum Benchmark suite
In this paper we present a platform independent analysis of the dynamic profiles of Java programs when executing on the Java Virtual Machine. The Java programs selected are taken...
Charlie Daly, Jane Horgan, James F. Power, John Wa...