Sciweavers

2553 search results - page 348 / 511
» Modeling Trees with Hypertextures
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
DASFAA
2003
IEEE
151views Database» more  DASFAA 2003»
15 years 3 months ago
Approximate String Matching in DNA Sequences
Approximate string matching on large DNA sequences data is very important in bioinformatics. Some studies have shown that suffix tree is an efficient data structure for approxim...
Lok-Lam Cheng, David Wai-Lok Cheung, Siu-Ming Yiu
95
Voted
AOSD
2003
ACM
15 years 3 months ago
A case for statically executable advice: checking the law of demeter with AspectJ
We define a generic join point model for checking the Law of Demeter (LoD). Join points are trees, pointcuts are predicates over join points, and advice is checked statically sim...
Karl J. Lieberherr, David H. Lorenz, Pengcheng Wu
BIRTHDAY
2003
Springer
15 years 3 months ago
Fair Equivalence Relations
Equivalence between designs is a fundamental notion in verification. The linear and branching approaches to verification induce different notions of equivalence. When the designs...
Orna Kupferman, Nir Piterman, Moshe Y. Vardi
65
Voted
ISCC
2002
IEEE
15 years 3 months ago
Performance of group communication over ad-hoc networks
We study the performance of reliable and unreliable allnode broadcast over ad-hoc networks that use contentionbased channel access. To obtain analytical results while preserving h...
Marc Mosko, J. J. Garcia-Luna-Aceves