Sciweavers

655 search results - page 115 / 131
» A behavioral approach to worm detection
Sort
View
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 3 months ago
Functional Coverage Driven Test Generation for Validation of Pipelined Processors
Functional verification of microprocessors is one of the most complex and expensive tasks in the current system-on-chip design process. A significant bottleneck in the validatio...
Prabhat Mishra, Nikil D. Dutt
ITCC
2005
IEEE
15 years 3 months ago
Protecting On-Line Casinos against Fraudulent Player Drop-Out
Some multiplayer, on-line games rely on the collaboration of all participating players. If a player’s gamble is aborted, the rest of players cannot continue playing. This behavi...
Joaquín García, Frédér...
73
Voted
SIGOPSE
2004
ACM
15 years 3 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
ISI
2004
Springer
15 years 3 months ago
Spatial Forecast Methods for Terrorist Events in Urban Environments
Abstract. Terrorist events such as suicide bombings are rare yet extremely destructive events. Responses to such events are even rarer, because they require forecasting methods for...
Donald Brown, Jason Dalton, Heidi Hoyle
FMCO
2003
Springer
114views Formal Methods» more  FMCO 2003»
15 years 2 months ago
Synchronous Closing and Flow Analysis for Model Checking Timed Systems
Abstract. Formal methods, in particular model checking, are increasingly accepted as integral part of system development. With large software systems beyond the range of fully auto...
Natalia Ioustinova, Natalia Sidorova, Martin Steff...