Sciweavers

83 search results - page 6 / 17
» Image-Based Anomaly Detection Technique: Algorithm, Implemen...
Sort
View
RAID
2005
Springer
15 years 3 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
DFT
2000
IEEE
119views VLSI» more  DFT 2000»
15 years 2 months ago
An Experimental Evaluation of the Effectiveness of Automatic Rule-Based Transformations for Safety-Critical Applications
1 Over the last years, an increasing number of safety-critical tasks have been demanded to computer systems. In particular, safety-critical computer-based applications are hitting ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...
PLDI
2009
ACM
15 years 4 months ago
LiteRace: effective sampling for lightweight data-race detection
Data races are one of the most common and subtle causes of pernicious concurrency bugs. Static techniques for preventing data races are overly conservative and do not scale well t...
Daniel Marino, Madanlal Musuvathi, Satish Narayana...
MVA
1998
110views Computer Vision» more  MVA 1998»
14 years 9 months ago
A fast algorithm for detecting die extrusion defects in IC packages
In this paper, we present a fast method for the detection of die extrusion defects in IC packages. The optical and lighting set-up as well as the details of the algorithm used for ...
H. Zhou, Ashraf A. Kassim, S. Ranganath
CAV
2008
Springer
157views Hardware» more  CAV 2008»
15 years 1 days ago
Effective Program Verification for Relaxed Memory Models
Program verification for relaxed memory models is hard. The high degree of nondeterminism in such models challenges standard verification techniques. This paper proposes a new veri...
Sebastian Burckhardt, Madanlal Musuvathi