408 results on '"Gregor von Bochmann"'
Search Results
2. Deriving Distributed Design Models from Global State Machines Requirements.
3. Domain Classifier: Compromised Machines Versus Malicious Registrations.
4. The 'Game Hack' Scam.
5. Using AP-TED to Detect Phishing Attack Variations.
6. Realizability of Service Specifications.
7. Using URL shorteners to compare phishing and malware attacks.
8. Phishing Attacks Modifications and Evolutions.
9. Tracking Phishing Attacks Over Time.
10. D-ForenRIA: Distributed Reconstruction of User-Interactions for Rich Internet Applications.
11. D-ForenRIA: a distributed tool to reconstruct user sessions for rich internet applications.
12. Conformance Testing with Respect to Partial-Order Specifications.
13. Reconstructing Interactions with Rich Internet Applications from HTTP Traces.
14. Fault Tolerant P2P RIA Crawling.
15. Synthesizing Controllers for Multi-lane Traffic Maneuvers.
16. Associativity between Weak and Strict Sequencing.
17. PDist-RIA Crawler: A Peer-to-Peer Distributed Crawler for Rich Internet Applications.
18. GDist-RIA Crawler: A Greedy Distributed Crawler for Rich Internet Applications.
19. A Scalable P2P RIA Crawling System with Partial Knowledge.
20. Workshop on the application of security and testing to rich internet applications.
21. Distributed Query Processing in an Ad-hoc Semantic Web Data Sharing System.
22. Building Rich Internet Applications Models: Example of a Better Strategy.
23. A brief history of web crawlers.
24. Dist-RIA Crawler: A Distributed Crawler for Rich Internet Applications.
25. Distributed B-Tree with Weak Consistency.
26. Performance Modeling of Distributed Collaboration Services with Independent Inputs/Outpus.
27. Stochastic Performance Analysis of Distributed Activities.
28. A Statistical Approach for Efficient Crawling of Rich Internet Applications.
29. Evaluating Reliability-Testing Usage Models.
30. Crawling rich internet applications: the state of the art.
31. Solving Some Modeling Challenges when Testing Rich Internet Applications for Security.
32. A Strategy for Efficient Crawling of Rich Internet Applications.
33. Transforming dynamic behavior specifications from activity diagrams to BPEL.
34. Improved Usage Model for Web Application Reliability Testing.
35. Performance modeling of distributed collaboration services.
36. Using Diffusive Load Balancing to Improve Performance of Peer-to-Peer Systems for Hosting Services.
37. Some Modeling Challenges When Testing Rich Internet Applications for Security.
38. Using First-Order Logic to Reason about Submodule Construction.
39. Deploying agile photonic networks over reconfigurable optical networks.
40. On Testing 1-Safe Petri Nets.
41. A Diffusive Load Balancing Scheme for Clustered Peer-to-Peer Systems.
42. A Distributed Algorithm for Least Constraining Slot Allocation in MPLS Optical TDM Networks.
43. Differentiated Static Resource Allocation in WDM Networks.
44. Resource Criticality Analysis of Static Resource Allocations in WDM Networks.
45. Testing k-Safe Petri Nets.
46. Towards a global online reputation.
47. CliqueStream: An Efficient and Fault-Resilient Live Streaming Network on a Clustered Peer-to-Peer Overlay.
48. Testing Systems Specified as Partial Order Input/Output Automata.
49. A QoS-based Service Composition for Content Adaptation.
50. Service-Oriented Virtual Private Networks for Grid Applications.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.