Sciweavers

549 search results - page 90 / 110
» Belief-Based Risk Analysis
Sort
View
DAC
2004
ACM
15 years 3 months ago
Probabilistic regression suites for functional verification
Random test generators are often used to create regression suites on-the-fly. Regression suites are commonly generated by choosing several specifications and generating a number o...
Shai Fine, Shmuel Ur, Avi Ziv
COMAD
2008
15 years 1 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
CSREASAM
2009
15 years 26 days ago
A Service Framework based on Grades of IdPs and SPs
In Web services, a framework for the separation of authentication (IdP) and services (SP) has been proposed and actually deployed. In this framework, quality of information provide...
Sato Hiroyuki
GRC
2010
IEEE
14 years 12 months ago
Interval Type-2 Fuzzy PI Controllers: Why They are More Robust
Abstract—Many experiments have shown that interval type2 (IT2) fuzzy PI controllers are generally more robust than their type-1 (T1) counterparts, as they are better able to cope...
Dongrui Wu, Woei Wan Tan
HPDC
2010
IEEE
14 years 12 months ago
Highly available component sharing in large-scale multi-tenant cloud systems
A multi-tenant cloud system allows multiple users to share a common physical computing infrastructure in a cost-effective way. Component sharing is highly desired in such a shared...
Juan Du, Xiaohui Gu, Douglas S. Reeves