Sciweavers

3410 search results - page 537 / 682
» Measuring Model Transformation in Model Driven Development
Sort
View
FORTE
2008
15 years 5 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
124
Voted
WSC
2000
15 years 5 months ago
Scheduling MEMS manufacturing
This paper focuses on the production scheduling in MEMS (Micro-Electro Mechanical System) manufacturing. The whole MEMS production process can be organized into 3 sub-processes, i...
Wang Lixin, Francis Eng Hock Tay, Loo Hay Lee
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
15 years 4 months ago
A hybrid method for tuning neural network for time series forecasting
This paper presents an study about a new Hybrid method GRASPES - for time series prediction, inspired in F. Takens theorem and based on a multi-start metaheuristic for combinatori...
Aranildo Rodrigues Lima Junior, Tiago Alessandro E...
125
Voted
CN
2007
80views more  CN 2007»
15 years 3 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
CORR
2007
Springer
138views Education» more  CORR 2007»
15 years 3 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy