Sciweavers

2403 search results - page 262 / 481
» Similarity of Event Sequences
Sort
View
CSFW
2007
IEEE
15 years 4 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
95
Voted
CONEXT
2008
ACM
15 years 2 months ago
Adapting TFRC to mobile networks with frequent disconnections
In the context of mobile and pervasive networking, it is not uncommon to experience frequent loss of connectivity. Congestion control algorithms usually mistake resulting packets ...
Olivier Mehani, Roksana Boreli
96
Voted
EPK
2004
122views Management» more  EPK 2004»
15 years 2 months ago
Transformation of ARIS Markup Language to EPML
: Heterogeneous and proprietary interchange formats pose a major problem for business process management. This applies in particular to processes that have been modelled as Event-D...
Jan Mendling, Markus Nüttgens
94
Voted
DMIN
2006
132views Data Mining» more  DMIN 2006»
15 years 2 months ago
An Overview of Associative Classifiers
Abstract-- Associative classification is a new classification approach integrating association mining and classification. It becomes a significant tool for knowledge discovery and ...
Yanmin Sun, Andrew K. C. Wong, Yang Wang 0007
CCR
2004
80views more  CCR 2004»
15 years 17 days ago
An analysis of TCP reset behaviour on the internet
This paper presents a one-year study of Internet packet traffic from a large campus network, showing that 15-25% of TCP connections have at least one TCP RST (reset). Similar resu...
Martin F. Arlitt, Carey L. Williamson