Sciweavers

3555 search results - page 213 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ASIASIM
2004
Springer
15 years 9 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
IWMM
2011
Springer
254views Hardware» more  IWMM 2011»
14 years 7 months ago
Short-term memory for self-collecting mutators
We propose a new memory model called short-term memory for managing objects on the heap. In contrast to the traditional persistent memory model for heap management, objects in sho...
Martin Aigner, Andreas Haas, Christoph M. Kirsch, ...
IJBC
2008
81views more  IJBC 2008»
15 years 4 months ago
On the Location and Continuation of Hopf bifurcations in Large-Scale Problems
CL_MATCONT is a MATLAB package for the study of dynamical systems and their bifurcations. It uses a minimally augmented system for continuation of the Hopf curve. The Continuation...
M. Friedman, W. Qiu
BMCBI
2010
189views more  BMCBI 2010»
15 years 4 months ago
High quality protein sequence alignment by combining structural profile prediction and profile alignment using SABERTOOTH
Background: Protein alignments are an essential tool for many bioinformatics analyses. While sequence alignments are accurate for proteins of high sequence similarity, they become...
Florian Teichert, Jonas Minning, Ugo Bastolla, Mar...
ECRTS
2007
IEEE
15 years 10 months ago
Thermal Faults Modeling Using a RC Model with an Application to Web Farms
Today’s CPUs consume a significant amount of power and generate a high amount of heat, requiring an active cooling system to support reliable operations. In case of cooling sys...
Alexandre P. Ferreira, Daniel Mossé, Jae C....