Sciweavers

3555 search results - page 206 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CJ
2004
141views more  CJ 2004»
15 years 4 months ago
Modeling and Analysis of a Scheduled Maintenance System: a DSPN Approach
This paper describes a way to manage the modeling and analysis of Scheduled Maintenance Systems (SMS) within an analytically tractable context. We chose a significant case study h...
Andrea Bondavalli, Roberto Filippini
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
15 years 2 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
FSEN
2007
Springer
15 years 10 months ago
Adapting the UPPAAL Model of a Distributed Lift System
Abstract. Groote, Pang and Wouters (2001) analyzed an existing distributed lift system using the process algebraic toolset µCRL. Pang, Karstens and Fokkink (2003) analyzed a redes...
Wan Fokkink, Allard Kakebeen, Jun Pang
VLDB
2004
ACM
73views Database» more  VLDB 2004»
15 years 9 months ago
Multi-objective Query Processing for Database Systems
Query processing in database systems has developed beyond mere exact matching of attribute values. Scoring database objects and retrieving only the top k matches or Pareto-optimal...
Wolf-Tilo Balke, Ulrich Güntzer
IJRFITA
2007
84views more  IJRFITA 2007»
15 years 4 months ago
Characterisation of RF propagation in metal pipes for passive RFID systems
: In this paper we extend the theory of Radio Frequency (RF) propagation as it relates to propagation within metal circular pipes. This work is motivated by a need to understand th...
Darmindra D. Arumugam, Daniel W. Engels