Sciweavers

2875 search results - page 263 / 575
» Model checking agentspeak
Sort
View
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
15 years 1 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
CHARME
2005
Springer
120views Hardware» more  CHARME 2005»
15 years 9 months ago
How Thorough Is Thorough Enough?
Abstraction is the key for effectively dealing with the state explosion in model-checking. Unfortunately, finding abstractions which are small and yet enable us to get conclusive ...
Arie Gurfinkel, Marsha Chechik
FASE
2005
Springer
15 years 9 months ago
A Framework for Counterexample Generation and Exploration
Model-checking is becoming an accepted technique for debugging hardware and software systems. Debugging is based on the “Check / Analyze / Fix” loop: check the system against a...
Marsha Chechik, Arie Gurfinkel
125
Voted
FTCS
1993
87views more  FTCS 1993»
15 years 5 months ago
Disk Array Storage System Reliability
Fault tolerance requirements for near term disk array storage systems are analyzed. The excellent reliability provided by RAID Level 5 data organization is seen to be insu cient f...
Walter A. Burkhard, Jai Menon
189
Voted
ASPLOS
2012
ACM
13 years 11 months ago
Providing safe, user space access to fast, solid state disks
Emerging fast, non-volatile memories (e.g., phase change memories, spin-torque MRAMs, and the memristor) reduce storage access latencies by an order of magnitude compared to state...
Adrian M. Caulfield, Todor I. Mollov, Louis Alex E...