Sciweavers

1592 search results - page 176 / 319
» The state of the email address
Sort
View
101
Voted
IPPS
1999
IEEE
15 years 5 months ago
A Formal Framework for Specifying and Verifying Time Warp Optimizations
Parallel and distributed systems are representative of large and complex systems that require the application of formal methods. These systems are often unreliable because implemen...
Victoria Chernyakhovsky, Peter Frey, Radharamanan ...
89
Voted
EWCBR
1998
Springer
15 years 5 months ago
Categorizing Case-Base Maintenance: Dimensions and Directions
Abstract. Experience with the growing number of large-scale CBR systems has led to increasing recognition of the importance of case-base maintenance. Multiple researchers have addr...
David B. Leake, David C. Wilson
110
Voted
POS
1998
Springer
15 years 5 months ago
Concurrency - The Fly in the Ointment?
Concurrency is a central pillar of the Java programming language, is implicit in the transactional model of computation adopted by most persistent systems, and has been widely stu...
Stephen Blackburn, John N. Zigman
122
Voted
CONEXT
2007
ACM
15 years 4 months ago
A hybrid finite automaton for practical deep packet inspection
Deterministic finite automata (DFAs) are widely used to perform regular expression matching in linear time. Several techniques have been proposed to compress DFAs in order to redu...
Michela Becchi, Patrick Crowley
104
Voted
ACSAC
2006
IEEE
15 years 4 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark