Sciweavers

1123 search results - page 90 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
135
Voted
ESWS
2004
Springer
15 years 9 months ago
Publish/Subscribe for RDF-based P2P Networks
Publish/subscribe systems are an alternative to query based systems in cases where the same information is asked for over and over, and where clients want to get updated answers fo...
Paul-Alexandru Chirita, Stratos Idreos, Manolis Ko...
164
Voted
DSOM
2006
Springer
15 years 7 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
RECOMB
2005
Springer
16 years 4 months ago
The Factor Graph Network Model for Biological Systems
Abstract. We introduce an extended computational framework for studying biological systems. Our approach combines formalization of existing qualitative models that are in wide but ...
Irit Gat-Viks, Amos Tanay, Daniela Raijman, Ron Sh...
CORR
2010
Springer
178views Education» more  CORR 2010»
15 years 2 months ago
Towards A Shape Analysis for Graph Transformation Systems
Graphs and graph transformation systems are a frequently used modelling technique for a wide range of different domains, covering areas as diverse as refactorings, network topolog...
Dominik Steenken, Heike Wehrheim, Daniel Wonisch
145
Voted
IFM
2010
Springer
152views Formal Methods» more  IFM 2010»
15 years 2 months ago
Satisfaction Meets Expectations - Computing Expected Values of Probabilistic Hybrid Systems with SMT
Stochastic satisfiability modulo theories (SSMT), which is an extension of satisfiability modulo theories with randomized quantification, has successfully been used as a symboli...
Martin Fränzle, Tino Teige, Andreas Eggers