Sciweavers

506 search results - page 50 / 102
» Constructor-based observational logic
Sort
View
DSN
2009
IEEE
14 years 10 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
112
Voted
ICCAD
2009
IEEE
96views Hardware» more  ICCAD 2009»
14 years 10 months ago
PSTA-based branch and bound approach to the silicon speedpath isolation problem
The lack of good "correlation" between pre-silicon simulated delays and measured delays on silicon (silicon data) has spurred efforts on so-called silicon debug. The ide...
Sari Onaissi, Khaled R. Heloue, Farid N. Najm
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 10 months ago
Evolutionary Approach to Test Generation for Functional BIST
In the paper, an evolutionary approach to test generation for functional BIST is considered. The aim of the proposed scheme is to minimize the test data volume by allowing the dev...
Y. A. Skobtsov, D. E. Ivanov, V. Y. Skobtsov, Raim...
121
Voted
CORR
2010
Springer
111views Education» more  CORR 2010»
14 years 10 months ago
Analysis Of Cancer Omics Data In A Semantic Web Framework
Our work concerns the elucidation of the cancer (epi)genome, transcriptome and proteome to better understand the complex interplay between a cancer cell's molecular state and ...
Matthew Holford, James P. McCusker, Kei-Hoi Cheung...
CAV
2012
Springer
222views Hardware» more  CAV 2012»
13 years 3 months ago
Leveraging Interpolant Strength in Model Checking
Craig interpolation is a well known method of abstraction successfully used in both hardware and software model checking. The logical strength of interpolants can affect the quali...
Simone Fulvio Rollini, Ondrej Sery, Natasha Sharyg...