Sciweavers

2978 search results - page 164 / 596
» Operations Research
Sort
View
163
Voted
ATVA
2011
Springer
213views Hardware» more  ATVA 2011»
14 years 3 months ago
Max and Sum Semantics for Alternating Weighted Automata
Abstract. In the traditional Boolean setting of formal verification, alternating automata are the key to many algorithms and tools. In this setting, the correspondence between dis...
Shaull Almagor, Orna Kupferman
114
Voted
FC
2010
Springer
150views Cryptology» more  FC 2010»
15 years 4 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
135
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
136
Voted
MONET
2007
194views more  MONET 2007»
15 years 3 months ago
Pervasive Healthcare and Wireless Health Monitoring
With an increasingly mobile society and the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many current and emerging healthcare appli...
Upkar Varshney
APNOMS
2008
Springer
15 years 5 months ago
Towards Management Requirements of Future Internet
The Internet is one of the most successful modern technologies; we cannot imagine what our lives would be without the Internet. Despite the huge success of the Internet, many probl...
Sung-Su Kim, Mi-Jung Choi, Hong-Taek Ju, Masayoshi...