Sciweavers

4693 search results - page 799 / 939
» Verifying Hybrid Systems
Sort
View
98
Voted
ICC
2008
IEEE
143views Communications» more  ICC 2008»
15 years 7 months ago
A Closed-Form Expression for Static Worm-Scanning Strategies
—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
Zesheng Chen, Chao Chen
107
Voted
ICDE
2008
IEEE
152views Database» more  ICDE 2008»
15 years 7 months ago
Automated generation of object summaries from relational databases: A novel keyword searching paradigm
— This paper introduces a novel keyword searching paradigm in Relational Databases (DBs), where the result of a search is a ranked set of Object Summaries (OSs). An OS summarizes...
Georgios John Fakas
84
Voted
IJCNN
2008
IEEE
15 years 7 months ago
A connection-limited neural network by InfoMax and InfoMin
— It is well known that edge filters in the visual system can be generated by the InfoMax principle. But, such models are nonlinear and employ fully-connected network structures...
Yoshitatsu Matsuda, Kazunori Yamaguchi
IWNAS
2008
IEEE
15 years 7 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
102
Voted
KBSE
2008
IEEE
15 years 7 months ago
Using Simulation to Investigate Requirements Prioritization Strategies
—Agile and traditional plan-based approaches to software system development both agree that prioritizing requirements is an essential activity. They differ in basic strategy - wh...
Daniel Port, Alexy Olkov, Tim Menzies