Sciweavers

2779 search results - page 420 / 556
» Modelling Immunological Memory
Sort
View
142
Voted
ICAS
2009
IEEE
139views Robotics» more  ICAS 2009»
15 years 10 months ago
Predicting Web Server Crashes: A Case Study in Comparing Prediction Algorithms
Abstract—Traditionally, performance has been the most important metrics when evaluating a system. However, in the last decades industry and academia have been paying increasing a...
Javier Alonso, Jordi Torres, Ricard Gavaldà
139
Voted
QEST
2009
IEEE
15 years 10 months ago
Mean-Field Analysis for the Evaluation of Gossip Protocols
—Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial...
Rena Bakhshi, Lucia Cloth, Wan Fokkink, Boudewijn ...
121
Voted
SBMF
2009
Springer
156views Formal Methods» more  SBMF 2009»
15 years 10 months ago
Applying Event and Machine Decomposition to a Flash-Based Filestore in Event-B
Abstract. Event-B is a formal method used for specifying and reasoning about systems. Rodin is a toolset for developing system models in Event-B. Our experiment which is outlined i...
Kriangsak Damchoom, Michael J. Butler
126
Voted
SPIN
2009
Springer
15 years 10 months ago
A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks
Abstract. We present a new decision procedure for detecting property violations in pushdown models for concurrent programs that use lock-based synchronization, where each thread’...
Nicholas Kidd, Peter Lammich, Tayssir Touili, Thom...
SOUPS
2009
ACM
15 years 10 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall