Sciweavers

571 search results - page 83 / 115
» Performing causality analysis by bounded model checking
Sort
View
ECOOP
2005
Springer
15 years 5 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
CIARP
2006
Springer
15 years 1 months ago
Robustness Analysis of the Neural Gas Learning Algorithm
The Neural Gas (NG) is a Vector Quantization technique where a set of prototypes self organize to represent the topology structure of the data. The learning algorithm of the Neural...
Carolina Saavedra, Sebastián Moreno, Rodrig...
SIAMCO
2000
71views more  SIAMCO 2000»
14 years 11 months ago
On a Perturbation Approach for the Analysis of Stochastic Tracking Algorithms
In this paper, a perturbation expansion technique is introduced to decompose the tracking error of a general adaptive tracking algorithm in a linear regression model. This method ...
Rafik Aguech, Eric Moulines, Pierre Priouret
JPDC
2008
122views more  JPDC 2008»
14 years 11 months ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...
FORMATS
2009
Springer
15 years 3 months ago
Stochastic Games for Verification of Probabilistic Timed Automata
Probabilistic timed automata (PTAs) are used for formal modelling and verification of systems with probabilistic, nondeterministic and real-time behaviour. For non-probabilistic ti...
Marta Z. Kwiatkowska, Gethin Norman, David Parker