Sciweavers

671 search results - page 82 / 135
» On Observing and Constraining Active Systems
Sort
View
86
Voted
COMPSAC
2006
IEEE
15 years 6 months ago
On the Distribution of Property Violations in Formal Models: An Initial Study
Model-checking techniques are successfully used in the verification of both hardware and software systems of industrial relevance. Unfortunately, the capability of current techni...
Jimin Gao, Mats Per Erik Heimdahl, David Owen, Tim...
105
Voted
NSPW
2003
ACM
15 years 6 months ago
Locality: a new paradigm for thinking about normal behavior and outsider threat
Locality as a unifying concept for understanding the normal behavior of benign users of computer systems is suggested as a unifying paradigm that will support the detection of mal...
John McHugh, Carrie Gates
WORDS
2002
IEEE
15 years 5 months ago
Deriving Interaction-Prone Scenarios in Feature Interaction Filtering with Use Case Maps
Feature interactions (FIs, in short) occur when features of different communication services interfere with each other. The FI filtering is a pre-processing before the FI detecti...
Masahide Nakamura, Pattara Leelaprute, Tohru Kikun...
113
Voted
ICANN
2010
Springer
15 years 1 months ago
Unsupervised Learning of Relations
Learning processes allow the central nervous system to learn relationships between stimuli. Even stimuli from different modalities can easily be associated, and these associations ...
Matthew Cook, Florian Jug, Christoph Krautz, Angel...
TFS
2008
90views more  TFS 2008»
15 years 17 days ago
Fuzzy Interpolation and Extrapolation: A Practical Approach
Fuzzy interpolation does not only help to reduce the complexity of fuzzy models, but also makes inference in sparse rule-based systems possible. It has been successfully applied to...
Zhiheng Huang, Qiang Shen