Sciweavers

76 search results - page 2 / 16
» Consequence analysis theory for alarm analysis
Sort
View
TACAS
2010
Springer
221views Algorithms» more  TACAS 2010»
14 years 19 days ago
Trace-Based Symbolic Analysis for Atomicity Violations
Abstract. We propose a symbolic algorithm to accurately predict atomicity violations by analyzing a concrete execution trace of a concurrent program. We use both the execution trac...
Chao Wang, Rhishikesh Limaye, Malay K. Ganai, Aart...
CIKM
1997
Springer
13 years 9 months ago
Learning Belief Networks from Data: An Information Theory Based Approach
This paper presents an efficient algorithm for learning Bayesian belief networks from databases. The algorithm takes a database as input and constructs the belief network structur...
Jie Cheng, David A. Bell, Weiru Liu
FM
2009
Springer
157views Formal Methods» more  FM 2009»
14 years 6 days ago
Symbolic Predictive Analysis for Concurrent Programs
Abstract. Predictive analysis aims at detecting concurrency errors during runtime by monitoring a concrete execution trace of a concurrent program. In recent years, various models ...
Chao Wang, Sudipta Kundu, Malay K. Ganai, Aarti Gu...
ACIIDS
2009
IEEE
105views Database» more  ACIIDS 2009»
13 years 3 months ago
Stability Analysis of Fuzzy Control for Nonlinear Systems
In this study, we propose a method of stability analysis for a GA-Based reference ANNC capable of handling these types of problems for a nonlinear system. The initial values of the...
Po-Chen Chen, Ken Yeh, Cheng-Wu Chen, Shu-Hao Lin
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 5 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi