Sciweavers

1728 search results - page 280 / 346
» Formal Modeling of Process Migration
Sort
View
ESORICS
2010
Springer
15 years 1 months ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...
86
Voted
GECCO
2008
Springer
104views Optimization» more  GECCO 2008»
15 years 1 months ago
Understanding elementary landscapes
The landscape formalism unites a finite candidate solution set to a neighborhood topology and an objective function. This construct can be used to model the behavior of local sea...
Darrell Whitley, Andrew M. Sutton, Adele E. Howe
120
Voted
ENTCS
2010
141views more  ENTCS 2010»
15 years 21 days ago
Debugging as a Science, that too, when your Program is Changing
Program debugging is an extremely time-consuming process, and it takes up a large portion of software development time. In practice, debugging is still very much of an art, with t...
Abhik Roychoudhury
109
Voted
RAS
2006
110views more  RAS 2006»
15 years 16 days ago
A methodology for provably stable behaviour-based intelligent control
This paper presents a design methodology for a class of behaviour-based control systems, arguing its potential for application to safety critical systems. We propose a formal basi...
Christopher J. Harper, Alan F. T. Winfield
119
Voted
ISSE
2007
15 years 15 days ago
Specifying real-time properties in autonomic systems
Increasingly, computer software must adapt dynamically to changing conditions. The correctness of adaptation cannot be rigorously addressed without precisely specifying the require...
Ji Zhang, Zhinan Zhou, Betty H. C. Cheng, Philip K...