Sciweavers

870 search results - page 112 / 174
» A New Approach to Modeling and Solving Minimal Perturbation ...
Sort
View
ICPADS
2007
IEEE
15 years 6 months ago
A forwarding model for Voronoi-based Overlay Network
One recent approach to build highly scalable and robust networked virtual environments (NVEs) is by using peer-to-peer overlay networks. Voronoi-based Overlay Network (VON) has be...
Jui-Fa Chen, Wei-Chuan Lin, Tsu-Han Chen, Shun-Yun...
ECML
1998
Springer
15 years 3 months ago
Predicate Invention and Learning from Positive Examples Only
Previous bias shift approaches to predicate invention are not applicable to learning from positive examples only, if a complete hypothesis can be found in the given language, as ne...
Henrik Boström
NDSS
2000
IEEE
15 years 3 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
NFM
2011
252views Formal Methods» more  NFM 2011»
14 years 6 months ago
Call Invariants
Program verifiers based on first-order theorem provers model the program heap as a collection of mutable maps. In such verifiers, preserving unmodified facts about the heap acr...
Shuvendu K. Lahiri, Shaz Qadeer
VL
2010
IEEE
209views Visual Languages» more  VL 2010»
14 years 10 months ago
Automatically Inferring ClassSheet Models from Spreadsheets
Many errors in spreadsheet formulas can be avoided if spreadsheets are built automatically from higher-level models that can encode and enforce consistency constraints. However, d...
Jacome Cunha, Martin Erwig, Joao Saraiva