Sciweavers

2421 search results - page 294 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
149
Voted
CAV
2001
Springer
119views Hardware» more  CAV 2001»
15 years 9 months ago
Certifying Model Checkers
Model Checking is an algorithmic technique to determine whether a temporal property holds of a program. For linear time properties, a model checker produces a counterexample comput...
Kedar S. Namjoshi
ATAL
2008
Springer
15 years 7 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...
139
Voted
CSFW
2005
IEEE
15 years 10 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information flow analysis for the specification and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers
ICIA
2007
15 years 7 months ago
Task Learning by Instruction: Benefits and Challenges for Intelligent Interactive Systems
The CALO desktop assistant aims to provide assistance through many AI technologies, including several techniques for learning to perform tasks. Based on our experiences implementi...
Jim Blythe, Prateek Tandon, Mandar Tillu
PRL
2007
98views more  PRL 2007»
15 years 4 months ago
Error probabilities for local extrema in gene expression data
Current approaches for the prediction of functional relations from gene expression data often do not have a clear methodology for extracting features and are not accompanied by a ...
Perry Groot, Christian Gilissen, Michael Egmont-Pe...