Sciweavers

589 search results - page 82 / 118
» Accurate Dependability Analysis of CAN-Based Networked Syste...
Sort
View
RAID
2005
Springer
15 years 7 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
BMCBI
2007
167views more  BMCBI 2007»
15 years 1 months ago
A stochastic differential equation model for transcriptional regulatory networks
Background: This work explores the quantitative characteristics of the local transcriptional regulatory network based on the availability of time dependent gene expression data se...
Adriana Climescu-Haulica, Michelle D. Quirk
IISWC
2009
IEEE
15 years 8 months ago
A communication characterisation of Splash-2 and Parsec
Recent benchmark suite releases such as Parsec specifically utilise the tightly coupled cores available in chipmultiprocessors to allow the use of newer, high performance, models ...
Nick Barrow-Williams, Christian Fensch, Simon Moor...
ICSM
2002
IEEE
15 years 6 months ago
The Information Gathering Strategies of Software Maintainers
In examining software maintenance processes for improvement opportunities, an obvious choice is information flow. Obtaining accurate, up-to-date, and useful information about a sy...
Carolyn B. Seaman
SAC
2004
ACM
15 years 7 months ago
Combining analysis and synthesis in a model of a biological cell
for ideas, and then abstract away from these ideas to produce algorithmic processes that can create problem solutions in a bottom-up manner. We have previously described a top-dow...
Ken Webb, Tony White