Sciweavers

443 search results - page 42 / 89
» Compensation-Aware Runtime Monitoring
Sort
View
ICCD
2005
IEEE
134views Hardware» more  ICCD 2005»
15 years 9 months ago
Analytical Model for Sensor Placement on Microprocessors
Thermal management in microprocessors has become a major design challenge in recent years. Thermal monitoring through hardware sensors is important, and these sensors must be care...
Kyeong-Jae Lee, Kevin Skadron, Wei Huang
CISIS
2010
IEEE
15 years 7 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
87
Voted
MLDM
2007
Springer
15 years 6 months ago
Applying Frequent Sequence Mining to Identify Design Flaws in Enterprise Software Systems
In this paper we show how frequent sequence mining (FSM) can be applied to data produced by monitoring distributed enterprise applications. In particular we show how we applied FSM...
Trevor Parsons, John Murphy, Patrick O'Sullivan
ICSE
2010
IEEE-ACM
15 years 4 months ago
Zenet: generating and enforcing real-time temporal invariants
Generating correct specifications for real-time event-driven software systems is difficult and time-consuming. Even when such specifications have been created, they are often us...
Chris Lewis
RV
2010
Springer
127views Hardware» more  RV 2010»
14 years 11 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone