Sciweavers

4693 search results - page 799 / 939
» Verifying Hybrid Systems
Sort
View
ICC
2008
IEEE
143views Communications» more  ICC 2008»
15 years 10 months ago
A Closed-Form Expression for Static Worm-Scanning Strategies
—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
Zesheng Chen, Chao Chen
ICDE
2008
IEEE
152views Database» more  ICDE 2008»
15 years 10 months ago
Automated generation of object summaries from relational databases: A novel keyword searching paradigm
— This paper introduces a novel keyword searching paradigm in Relational Databases (DBs), where the result of a search is a ranked set of Object Summaries (OSs). An OS summarizes...
Georgios John Fakas
IJCNN
2008
IEEE
15 years 10 months ago
A connection-limited neural network by InfoMax and InfoMin
— It is well known that edge filters in the visual system can be generated by the InfoMax principle. But, such models are nonlinear and employ fully-connected network structures...
Yoshitatsu Matsuda, Kazunori Yamaguchi
IWNAS
2008
IEEE
15 years 10 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
KBSE
2008
IEEE
15 years 10 months ago
Using Simulation to Investigate Requirements Prioritization Strategies
—Agile and traditional plan-based approaches to software system development both agree that prioritizing requirements is an essential activity. They differ in basic strategy - wh...
Daniel Port, Alexy Olkov, Tim Menzies