Sciweavers

1541 search results - page 220 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
104
Voted
GECCO
2008
Springer
146views Optimization» more  GECCO 2008»
15 years 1 months ago
A formal performance modeling framework for bio-inspired ad hoc routing protocols
Bio-inspired ad hoc routing is an active area of research. The designers of these algorithms predominantly evaluate the performance of their protocols with the help of simulation ...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
122
Voted
IWANN
1995
Springer
15 years 4 months ago
EL-SIM: a Development Environment for Neuro-Fuzzy Intelligent Controllers
1 This paper presents a new technique for the design of real-time controllers based on a hybrid approach which integrates several control strategies, such as intelligent controlle...
Marcello Chiaberge, G. Di Bene, S. Di Pascoli, R. ...
CCS
2006
ACM
15 years 4 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
69
Voted
DSN
2005
IEEE
15 years 6 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
88
Voted
COR
2006
99views more  COR 2006»
15 years 19 days ago
Artificial neural networks and multicriterion analysis for sustainable irrigation planning
The objective of the present paper is to select the best compromise irrigation planning strategy for the case study of Jayakwadi irrigation project, Maharashtra, India. Four-phase...
K. Srinivasa Raju, D. Nagesh Kumar, Lucien Duckste...