Sciweavers

2520 search results - page 84 / 504
» Model-checking behavioral programs
Sort
View
RAID
2000
Springer
15 years 4 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
WCRE
2000
IEEE
15 years 5 months ago
Understanding the Behavior of Java Programs
To fully understand the underlying architecture of an object-oriented software system, both static and dynamic analyses are needed. Dynamic reverse engineering techniques are espe...
Tarja Systä
ROBOCUP
2001
Springer
147views Robotics» more  ROBOCUP 2001»
15 years 5 months ago
Behavior Combination and Swarm Programming
Abstract. The RoboCup Simulator League provides an excellent platform for research on swarm computing. Our research focuses on group behaviors emerge from collections of actors mak...
Keen Browne, Jon McCune, Adam Trost, David Evans, ...
ENTCS
2006
160views more  ENTCS 2006»
15 years 21 days ago
Checking and Correcting Behaviors of Java Programs at Runtime with Java-MOP
Monitoring-oriented programming (MOP) is a software development and analysis technique in which monitoring plays a fundamental role. MOP users can add their favorite or domain-spe...
Feng Chen, Marcelo d'Amorim, Grigore Rosu
COR
2002
90views more  COR 2002»
15 years 16 days ago
Extremist vs. centrist decision behavior: quasi-convex utility functions for interactive multi-objective linear programming prob
This paper presents the fundamental theory and algorithms for identifying the most preferred alternative for a decision maker (DM) having a non-centrist (or extremist) preferentia...
Behnam Malakooti, Jumah E. Al-alwani