Sciweavers

1321 search results - page 144 / 265
» Logic Simulation Using Networks of State Machines
Sort
View
LISA
2007
15 years 7 days ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
AVSS
2009
IEEE
15 years 1 months ago
Bayesian Bio-inspired Model for Learning Interactive Trajectories
—Automatic understanding of human behavior is an important and challenging objective in several surveillance applications. One of the main problems of this task consists in accur...
Alessio Dore, Carlo S. Regazzoni
DSN
2008
IEEE
15 years 4 months ago
A characterization of instruction-level error derating and its implications for error detection
In this work, we characterize a significant source of software derating that we call instruction-level derating. Instruction-level derating encompasses the mechanisms by which co...
Jeffrey J. Cook, Craig B. Zilles
AINA
2009
IEEE
15 years 4 months ago
A New Approach to Model Web Services' Behaviors Based on Synchronization
This paper introduces a novel approach for modelling and specifying behaviors of Web services. This approach excludes Web services from any composition scenario and sheds the ligh...
Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Jam...
VLSID
2005
IEEE
120views VLSI» more  VLSID 2005»
15 years 3 months ago
On Finding Consecutive Test Vectors in a Random Sequence for Energy-Aware BIST Design
During pseudorandom testing, a significant amount of energy and test application time is wasted for generating and for applying “useless” test vectors that do not contribute t...
Sheng Zhang, Sharad C. Seth, Bhargab B. Bhattachar...