Sciweavers

3909 search results - page 498 / 782
» Extreme Model Checking
Sort
View
128
Voted
JUCS
2006
124views more  JUCS 2006»
15 years 5 months ago
Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM
Abstract: We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [Itai and Rodeh 1...
Wan Fokkink, Jun Pang
127
Voted
NECO
2008
60views more  NECO 2008»
15 years 5 months ago
Sleeping Our Way to Weight Normalization and Stable Learning
The functions of sleep have been an enduring mystery. Recently, Tononi and Cirelli hypothesized that one of the functions of slow-wave sleep is to scale down synapses in the corte...
Thomas J. Sullivan, Virginia R. de Sa
COMCOM
2002
189views more  COMCOM 2002»
15 years 4 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
ENTCS
2002
139views more  ENTCS 2002»
15 years 4 months ago
Automatic Verification of the IEEE-1394 Root Contention Protocol with KRONOS and PRISM
We report on the automatic verification of timed probabilistic properties of the IEEE 1394 root contention protocol combining two existing tools: the real-time modelchecker Kronos...
Conrado Daws, Marta Z. Kwiatkowska, Gethin Norman
126
Voted
SAC
2008
ACM
15 years 4 months ago
Using simplified event calculus in digital investigation
In a hypothesis-based approach to digital investigation, the investigator formulates his hypothesis about which events took place, and tests them using the evidence available. A f...
Svein Yngvar Willassen