Sciweavers

549 search results - page 90 / 110
» Belief-Based Risk Analysis
Sort
View
130
Voted
DAC
2004
ACM
15 years 5 months ago
Probabilistic regression suites for functional verification
Random test generators are often used to create regression suites on-the-fly. Regression suites are commonly generated by choosing several specifications and generating a number o...
Shai Fine, Shmuel Ur, Avi Ziv
COMAD
2008
15 years 3 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
CSREASAM
2009
15 years 3 months ago
A Service Framework based on Grades of IdPs and SPs
In Web services, a framework for the separation of authentication (IdP) and services (SP) has been proposed and actually deployed. In this framework, quality of information provide...
Sato Hiroyuki
GRC
2010
IEEE
15 years 2 months ago
Interval Type-2 Fuzzy PI Controllers: Why They are More Robust
Abstract—Many experiments have shown that interval type2 (IT2) fuzzy PI controllers are generally more robust than their type-1 (T1) counterparts, as they are better able to cope...
Dongrui Wu, Woei Wan Tan
HPDC
2010
IEEE
15 years 2 months ago
Highly available component sharing in large-scale multi-tenant cloud systems
A multi-tenant cloud system allows multiple users to share a common physical computing infrastructure in a cost-effective way. Component sharing is highly desired in such a shared...
Juan Du, Xiaohui Gu, Douglas S. Reeves