Sciweavers

1753 search results - page 278 / 351
» State Machines
Sort
View
NETWORK
2008
94views more  NETWORK 2008»
14 years 10 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
MCS
2006
Springer
14 years 10 months ago
Architectural concepts and Design Patterns for behavior modeling and integration
The design of the control software for complex systems is a difficult task. It requires the modeling, the simulation, the integration and the adaptation of a multitude of intercon...
Jean-Marc Perronne, Laurent Thiry, Bernard Thirion
SOCA
2008
IEEE
14 years 10 months ago
Specification of realizable service conversations using collaboration diagrams
Specification, modeling and analysis of interactions among peers that communicate via messages are becoming increasingly important due to the emergence of service oriented computi...
Tevfik Bultan, Xiang Fu
TCOM
2008
63views more  TCOM 2008»
14 years 10 months ago
A general construction of constrained parity-check codes for optical recording
This paper proposes a general and systematic code design method to efficiently combine constrained codes with parity-check (PC) codes for optical recording. The proposed constraine...
Kui Cai, Kees A. Schouhamer Immink
TVLSI
2008
140views more  TVLSI 2008»
14 years 10 months ago
A Novel Mutation-Based Validation Paradigm for High-Level Hardware Descriptions
We present a Mutation-based Validation Paradigm (MVP) technology that can handle complete high-level microprocessor implementations and is based on explicit design error modeling, ...
Jorge Campos, Hussain Al-Asaad