Sciweavers

3820 search results - page 322 / 764
» Bounded Model Debugging
Sort
View
CSFW
2012
IEEE
13 years 6 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
KDD
2002
ACM
171views Data Mining» more  KDD 2002»
16 years 4 months ago
Mining complex models from arbitrarily large databases in constant time
In this paper we propose a scaling-up method that is applicable to essentially any induction algorithm based on discrete search. The result of applying the method to an algorithm ...
Geoff Hulten, Pedro Domingos
ICC
2008
IEEE
115views Communications» more  ICC 2008»
15 years 11 months ago
Connectivity Model for Wireless Mesh Networks
—This paper presents a novel methodology for finding the network connectivity in wireless mesh networks while taking into account dependencies existing between links of geometri...
Mohamed Abou El Saoud, Hussein Al-Zubaidy, Samy Ma...
RTCSA
2006
IEEE
15 years 10 months ago
An RTOS API Translator for Model-Driven Embedded Software Development
In this paper, we present a model-driven approach to RTOS-based embedded software development and an automated tool that can produce RTOS-specific code. Our contributions are two ...
Ji Chan Maeng, Jong-Hyuk Kim, Minsoo Ryu
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 9 months ago
Prototype Implementations of an Architectural Model for Service-Based Flexible Software
The need to change software easily to meet evolving business requirements is urgent, and a radical shift is required in the development of software, with a more demand-centric vie...
Keith H. Bennett, Malcolm Munro, Jie Xu, Nicolas G...