Sciweavers

6329 search results - page 1217 / 1266
» Detection of Stochastic Processes
Sort
View
IJCNN
2008
IEEE
15 years 11 months ago
Learning to select relevant perspective in a dynamic environment
— When an agent observes its environment, there are two important characteristics of the perceived information. One is the relevance of information and the other is redundancy. T...
Zhihui Luo, David A. Bell, Barry McCollum, Qingxia...
IPPS
2008
IEEE
15 years 11 months ago
Software monitoring with bounded overhead
In this paper, we introduce the new technique of HighConfidence Software Monitoring (HCSM), which allows one to perform software monitoring with bounded overhead and concomitantl...
Sean Callanan, David J. Dean, Michael Gorbovitski,...
MOBIQUITOUS
2008
IEEE
15 years 11 months ago
Data aggregation in VANETs: the VESPA approach
VESPA (Vehicular Event Sharing with a mobile P2P Architecture) 1 is a system for enabling vehicles to share information in vehicular ad-hoc networks (VANETs). The originality of V...
Bruno Defude, Thierry Delot, Sergio Ilarri, Jos&ea...
NCA
2008
IEEE
15 years 11 months ago
APART: Low Cost Active Replication for Multi-tier Data Acquisition Systems
This paper proposes APART (A Posteriori Active ReplicaTion), a novel active replication protocol specifically tailored for multi-tier data acquisition systems. Unlike existing ac...
Paolo Romano, Diego Rughetti, Francesco Quaglia, B...
151
Voted
NDSS
2008
IEEE
15 years 11 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
« Prev « First page 1217 / 1266 Last » Next »