Sciweavers

2468 search results - page 317 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
POPL
2011
ACM
14 years 6 months ago
Making prophecies with decision predicates
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...
Byron Cook, Eric Koskinen
IPPS
2006
IEEE
15 years 10 months ago
Trust overlay networks for global reputation aggregation in P2P grid computing
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
Runfang Zhou, Kai Hwang
KDD
2005
ACM
193views Data Mining» more  KDD 2005»
16 years 4 months ago
An approach to spacecraft anomaly detection problem using kernel feature space
Development of advanced anomaly detection and failure diagnosis technologies for spacecraft is a quite significant issue in the space industry, because the space environment is ha...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida
WETICE
2005
IEEE
15 years 9 months ago
Challenges and Solutions for Model Driven Web Service Composition
System theory propagates the use of models which e level of abstraction to cope with complexity, evolving out of variety and connectivity. Different modeling techniques have been ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...
CCGRID
2003
IEEE
15 years 9 months ago
Criticality-based Analysis and Design of Unstructured Peer-to-Peer Networks as "Complex Systems"
— Due to enormous complexity of the unstructured peer-to-peer networks as large-scale, self-configure, and dynamic systems, the models used to characterize these systems are eit...
Farnoush Banaei Kashani, Cyrus Shahabi