Sciweavers

6960 search results - page 337 / 1392
» Continuity Analysis of Programs
Sort
View
IEEECGIV
2008
IEEE
15 years 11 months ago
A Product Design Using an S-Shaped and C-Shaped Transition Curves
The focus of this paper is to design a spur gear using an S-shaped transition curve where certain conditions need to be fulfilled such as curvature continuity, shaped parameter etc...
Saifudin Hafiz Yahaya, Jamaludin Md Ali, Muhammad ...
POPL
2012
ACM
14 years 1 days ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...
AUTONOMICS
2008
ACM
15 years 6 months ago
On modeling of self-organizing systems
A goal of computing and networking systems is to limit administrative requirements for users and operators. A technical systems should be able to configure itself as much as possi...
Richard Holzer, Hermann de Meer
DAC
2005
ACM
16 years 5 months ago
StressTest: an automatic approach to test generation via activity monitors
The challenge of verifying a modern microprocessor design is an overwhelming one: Increasingly complex micro-architectures combined with heavy time-to-market pressure have forced ...
Ilya Wagner, Valeria Bertacco, Todd M. Austin
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 4 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik