Sciweavers

549 search results - page 56 / 110
» formats 2010
Sort
View
91
Voted
RAID
2010
Springer
14 years 11 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
121
Voted
SAGT
2010
Springer
202views Game Theory» more  SAGT 2010»
14 years 11 months ago
Computing Stable Outcomes in Hedonic Games
We study the computational complexity of finding stable outcomes in symmetric additively-separable hedonic games. These coalition formation games are specified by an undirected e...
Martin Gairing, Rahul Savani
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
14 years 11 months ago
Querying RDF streams with C-SPARQL
Continuous SPARQL (C-SPARQL) is a new language for continuous queries over streams of RDF data. CSPARQL queries consider windows, i.e., the most recent triples of such streams, ob...
Davide Francesco Barbieri, Daniele Braga, Stefano ...
95
Voted
SMC
2010
IEEE
159views Control Systems» more  SMC 2010»
14 years 11 months ago
Mobile interaction with smart environments through linked data
This paper presents the design and architecture of an integrated environment that provides location independent and mobile access to Intelligent Domotic Environments. The envision...
Faisal Razzak, Dario Bonino, Fulvio Corno
107
Voted
STTT
2010
134views more  STTT 2010»
14 years 11 months ago
A case study to evaluate the suitability of graph transformation tools for program refactoring
This article proposes a case study to evaluate the suitability of graph transformation tools for program refactoring. In order to qualify for this purpose, a graph transformation s...
Francisco Javier Pérez, Yania Crespo, Berth...