Sciweavers

22698 search results - page 4309 / 4540
» Modeling in Software Engineering
Sort
View
SYNTHESE
2008
84views more  SYNTHESE 2008»
15 years 3 months ago
How experimental algorithmics can benefit from Mayo's extensions to Neyman-Pearson theory of testing
Although theoretical results for several algorithms in many application domains were presented during the last decades, not all algorithms can be analyzed fully theoretically. Exp...
Thomas Bartz-Beielstein
111
Voted
ISCI
2007
135views more  ISCI 2007»
15 years 3 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
TKDE
2008
108views more  TKDE 2008»
15 years 3 months ago
Grid Service Discovery with Rough Sets
The computational grid is rapidly evolving into a service-oriented computing infrastructure that facilitates resource sharing and large-scale problem solving over the Internet. Ser...
Maozhen Li, Bin Yu, Omer F. Rana, Zidong Wang
TON
2008
239views more  TON 2008»
15 years 3 months ago
Characterization of failures in an operational IP backbone network
Abstract--As the Internet evolves into a ubiquitous communication infrastructure and supports increasingly important services, its dependability in the presence of various failures...
Athina Markopoulou, Gianluca Iannaccone, Supratik ...
JSW
2007
185views more  JSW 2007»
15 years 3 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...
« Prev « First page 4309 / 4540 Last » Next »