Sciweavers

1205 search results - page 234 / 241
» Program Extraction from Large Proof Developments
Sort
View
SASO
2007
IEEE
15 years 3 months ago
Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT
Information systems form the backbones of the critical infrastructures of modern societies. Unfortunately, these systems are highly vulnerable to attacks that can result in enormo...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
OOPSLA
2007
Springer
15 years 3 months ago
Living in the comfort zone
A comfort zone is a tested region of a system’s input space within which it has been observed to behave acceptably. To keep systems operating within their comfort zones, we advo...
Martin C. Rinard
VLDB
2007
ACM
134views Database» more  VLDB 2007»
15 years 3 months ago
Challenges and Experience in Prototyping a Multi-Modal Stream Analytic and Monitoring Application on System S
In this paper, we describe the challenges of prototyping a reference application on System S, a distributed stream processing middleware under development at IBM Research. With a ...
Kun-Lung Wu, Philip S. Yu, Bugra Gedik, Kirsten Hi...
SC
2000
ACM
15 years 1 months ago
Parallel Smoothed Aggregation Multigrid: Aggregation Strategies on Massively Parallel Machines
Algebraic multigrid methods offer the hope that multigrid convergence can be achieved (for at least some important applications) without a great deal of effort from engineers an...
Ray S. Tuminaro, Charles Tong
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw