Sciweavers

3031 search results - page 483 / 607
» Model Driven Testing Based on Test History
Sort
View
116
Voted
FMCAD
2004
Springer
15 years 4 months ago
Bloom Filters in Probabilistic Verification
Abstract. Probabilistic techniques for verification of finite-state transition systems offer huge memory savings over deterministic techniques. The two leading probabilistic scheme...
Peter C. Dillinger, Panagiotis Manolios
FLAIRS
2008
15 years 3 months ago
Using Genetic Programming to Increase Rule Quality
Rule extraction is a technique aimed at transforming highly accurate opaque models like neural networks into comprehensible models without losing accuracy. G-REX is a rule extract...
Rikard König, Ulf Johansson, Lars Niklasson
102
Voted
USS
2008
15 years 3 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
112
Voted
WSC
2007
15 years 3 months ago
An exploration-based taxonomy for emergent behavior analysis in simulations
Emergent behaviors in simulations require explanation, so that valid behaviors can be separated from design or coding errors. We present a taxonomy, to be applied to emergent beha...
Ross Gore, Paul F. Reynolds Jr.
CRITIS
2007
15 years 2 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...