Sciweavers

3090 search results - page 482 / 618
» On Testing Answer-Set Programs
Sort
View
SIGSOFT
2007
ACM
16 years 3 months ago
State space exploration using feedback constraint generation and Monte-Carlo sampling
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
147
Voted
KDD
2006
ACM
174views Data Mining» more  KDD 2006»
16 years 2 months ago
Onboard classifiers for science event detection on a remote sensing spacecraft
Typically, data collected by a spacecraft is downlinked to Earth and pre-processed before any analysis is performed. We have developed classifiers that can be used onboard a space...
Ashley Davies, Benjamin Cichy, Dominic Mazzoni, Ng...
AGS
2009
Springer
15 years 9 months ago
Intelligent Agent Modeling as Serious Game
We propose a novel approach to intelligent tutoring gaming simulations designed for both educational and inquiry purposes in complex multi-actor systems such as infrastructures or...
D. W. F. van Krevelen
126
Voted
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 8 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
106
Voted
ASPLOS
2006
ACM
15 years 8 months ago
Ultra low-cost defect protection for microprocessor pipelines
The sustained push toward smaller and smaller technology sizes has reached a point where device reliability has moved to the forefront of concerns for next-generation designs. Sil...
Smitha Shyam, Kypros Constantinides, Sujay Phadke,...