Sciweavers

76 search results - page 2 / 16
» Consequence analysis theory for alarm analysis
Sort
View
TACAS
2010
Springer
221views Algorithms» more  TACAS 2010»
14 years 12 days ago
Trace-Based Symbolic Analysis for Atomicity Violations
Abstract. We propose a symbolic algorithm to accurately predict atomicity violations by analyzing a concrete execution trace of a concurrent program. We use both the execution trac...
Chao Wang, Rhishikesh Limaye, Malay K. Ganai, Aart...
CIKM
1997
Springer
13 years 9 months ago
Learning Belief Networks from Data: An Information Theory Based Approach
This paper presents an efficient algorithm for learning Bayesian belief networks from databases. The algorithm takes a database as input and constructs the belief network structur...
Jie Cheng, David A. Bell, Weiru Liu
FM
2009
Springer
157views Formal Methods» more  FM 2009»
13 years 12 months ago
Symbolic Predictive Analysis for Concurrent Programs
Abstract. Predictive analysis aims at detecting concurrency errors during runtime by monitoring a concrete execution trace of a concurrent program. In recent years, various models ...
Chao Wang, Sudipta Kundu, Malay K. Ganai, Aarti Gu...
ACIIDS
2009
IEEE
105views Database» more  ACIIDS 2009»
13 years 3 months ago
Stability Analysis of Fuzzy Control for Nonlinear Systems
In this study, we propose a method of stability analysis for a GA-Based reference ANNC capable of handling these types of problems for a nonlinear system. The initial values of the...
Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 5 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi