Sciweavers

1906 search results - page 129 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
132
Voted
EDOC
2007
IEEE
15 years 9 months ago
Modeling and Integrating Aspects into Component Architectures
Dependable software systems are difficult to develop because developers must understand and address several interdependent and pervasive dependability concerns. Features that addr...
Lydia Michotte, Robert B. France, Franck Fleurey
105
Voted
IJACTAICIT
2010
95views more  IJACTAICIT 2010»
15 years 24 days ago
Expert System Design of Two Electrostatic Lenses Column by Mixing Dynamic Programming and AI Techniques
This paper have shown an expert system design by using optimization methods for the Focused ion beam FIB optical system, by mixing the dynamic programming procedure and artificial...
Fadhil A. Ali
152
Voted
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
15 years 9 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 9 months ago
Binary Repetition Codes and SPC Product Codes for Coded and Cooperative Diversity Systems
— A three stage network protocol that can achieve coded and cooperative diversity to improve network coverage is investigated. In Stage 1, a cyclic redundancy check code is used ...
Pavel Loskot, Norman C. Beaulieu
155
Voted
JSS
2002
198views more  JSS 2002»
15 years 3 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...