Sciweavers

470 search results - page 65 / 94
» Test Case Generation Based on State and Activity Models
Sort
View
140
Voted
TON
2010
167views more  TON 2010»
14 years 7 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
89
Voted
IJAR
1998
76views more  IJAR 1998»
15 years 4 days ago
Multi-site scheduling with fuzzy concepts
The objective of multi-site scheduling is to support the scheduling activities of a global scheduler and schedulers in distributed production plants in a cooperative way. A global...
Jürgen Sauer, Gerd Suelmann, Hans-Jürgen...
85
Voted
ER
2007
Springer
142views Database» more  ER 2007»
15 years 6 months ago
Automatic Hidden-Web Table Interpretation by Sibling Page Comparison
The longstanding problem of automatic table interpretation still illudes us. Its solution would not only be an aid to table processing applications such as large volume table conve...
Cui Tao, David W. Embley
ICCAD
1999
IEEE
81views Hardware» more  ICCAD 1999»
15 years 4 months ago
Modeling design constraints and biasing in simulation using BDDs
Constraining and input biasing are frequently used techniques in functional verification methodologies based on randomized simulation generation. Constraints confine the simulatio...
Jun Yuan, Kurt Shultz, Carl Pixley, Hillel Miller,...
ICICS
2005
Springer
15 years 6 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...