Sciweavers

817 search results - page 91 / 164
» Malware behaviour analysis
Sort
View
TCOM
2010
98views more  TCOM 2010»
14 years 6 months ago
Convolutionally Coded Transmission over Markov-Gaussian Channels: Analysis and Decoding Metrics
It has been widely acknowledged that the aggregate interference at the receiver for various practical communication channels can often deviate markedly from the classical additive ...
Jeebak Mitra, Lutz H.-J. Lampe
BMCBI
2007
97views more  BMCBI 2007»
15 years 13 hour ago
A procedure for the estimation over time of metabolic fluxes in scenarios where measurements are uncertain and/or insufficient
Background: An indirect approach is usually used to estimate the metabolic fluxes of an organism: couple the available measurements with known biological constraints (e.g. stoichi...
Francisco Llaneras, Jesús Picó
RTA
2009
Springer
15 years 6 months ago
VMTL-A Modular Termination Laboratory
Abstract. The automated analysis of termination of term rewriting systems (TRSs) has drawn a lot of attention in the scientific community during the last decades and many differe...
Felix Schernhammer, Bernhard Gramlich
EUROPAR
2007
Springer
15 years 6 months ago
Delayed Side-Effects Ease Multi-core Programming
Computer systems are increasingly parallel and heterogeneous, while programs are still largely written in sequential languages. The obvious suggestion that the compiler should auto...
Anton Lokhmotov, Alan Mycroft, Andrew Richards
APNOMS
2006
Springer
15 years 3 months ago
Temporal Patterns and Properties in Multiple-Flow Interactions
It is widely recognized that today's Internet traffic is mostly carried by a relatively small number of elephant flows while mice flows constitute up to 80% of all active flow...
Marat Zhanikeev, Yoshiaki Tanaka