Sciweavers

5639 search results - page 917 / 1128
» Timed Abstract Non-interference
Sort
View
OPODIS
2008
15 years 4 months ago
Rendezvous of Mobile Agents When Tokens Fail Anytime
Abstract. We consider the problem of Rendezvous or gathering of multiple autonomous entities (called mobile agents) moving in an unlabelled environment (modelled as a graph). The p...
Shantanu Das, Matús Mihalák, Rastisl...
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 4 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
SERP
2008
15 years 4 months ago
Practically Relevant Quality Criteria for Requirements Documents
Abstract. This paper presents common weaknesses of requirements documents from commercial software projects that frequently cause problems in practice. Many documents contain exten...
Tobias Simon, Jonathan Streit, Markus Pizka
NETWORKING
2007
15 years 4 months ago
Detecting 802.11 Wireless Hosts from Remote Passive Observations
Abstract. The wide deployment of 802.11 WLANs has led to the coexistence of wired and wireless clients in a network environment. This paper presents a robust technique to detect 80...
Valeria Baiamonte, Konstantina Papagiannaki, Gianl...
SPLC
2008
15 years 4 months ago
Using Aspects and Component Concepts to Improve Reuse of Software for Embedded Systems Product Lines
Embedded systems have several characteristics, such as application specific needs, real-time constraints and intrinsic embedded concerns (i.e. energy consumption), which hinder th...
Edison Pignaton de Freitas, Marco A. Wehrmeister, ...