Sciweavers

557 search results - page 92 / 112
» Automatic Abstraction for Verification of Timed Circuits and...
Sort
View
ISF
2008
114views more  ISF 2008»
14 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 4 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
MAGS
2010
97views more  MAGS 2010»
14 years 8 months ago
Towards reliable multi-agent systems: An adaptive replication mechanism
Abstract. Distributed cooperative applications (e.g., e-commerce) are now increasingly being designed as a set of autonomous entities, named agents, which interact and coordinate (...
Zahia Guessoum, Jean-Pierre Briot, Nora Faci, Oliv...
ASPLOS
2011
ACM
14 years 1 months ago
S2E: a platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software systems. We demonstrate S2E’s use in developing practical tools for comprehensive perfo...
Vitaly Chipounov, Volodymyr Kuznetsov, George Cand...
ACII
2007
Springer
15 years 3 months ago
Model of Facial Expressions Management for an Embodied Conversational Agent
Abstract. In this paper we present a model of facial behaviour encompassing interpersonal relations for an Embodied Conversational Agent (ECA). Although previous solutions of this ...
Radoslaw Niewiadomski, Catherine Pelachaud