Sciweavers

491 search results - page 13 / 99
» Avoiding Determinization
Sort
View
RAID
1999
Springer
15 years 3 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
TACAS
2001
Springer
92views Algorithms» more  TACAS 2001»
15 years 3 months ago
Language Containment Checking with Nondeterministic BDDs
Abstract. Checking for language containment between nondeterministic ω-automata is a central task in automata-based hierarchical verification. We present a symbolic procedure for...
Bernd Finkbeiner
LPAR
2010
Springer
14 years 8 months ago
Synthesis of Trigger Properties
In automated synthesis, we transform a specification into a system that is guaranteed to satisfy the specification. In spite of the rich theory developed for temporal synthesis, l...
Orna Kupferman, Moshe Y. Vardi
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
15 years 4 months ago
Systematic Analysis of Active Clock Deskewing Systems Using Control Theory
— A formal methodology for the analysis of a closed loop clock distribution and active deskewing network is proposed. In this paper an active clock distribution and deskewing net...
Vinil Varghese, Tom Chen, Peter Michael Young
EPIA
2007
Springer
15 years 5 months ago
Improving Evolutionary Algorithms with Scouting
The goal of an Evolutionary Algorithm(EA) is to find the optimal solution to a given problem by evolving a set of initial potential solutions. When the problem is multi-modal, an ...
Konstantinos Bousmalis, Gillian M. Hayes, Jeffrey ...