Sciweavers

1888 search results - page 226 / 378
» Proof theory and computational analysis
Sort
View
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 5 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
CDC
2010
IEEE
120views Control Systems» more  CDC 2010»
14 years 9 months ago
Statistical properties of the error covariance in a Kalman filter with random measurement losses
In this paper we study statistical properties of the error covariance matrix of a Kalman filter, when it is subject to random measurement losses. We introduce a sequence of tighter...
Eduardo Rohr, Damián Marelli, Minyue Fu
MOBIHOC
2008
ACM
16 years 1 months ago
Complexity of scheduling with analog network coding
In this paper we analyze the complexity of scheduling wireless links in the physical interference model with analog network coding capability. We study two models with different d...
Olga Goussevskaia, Roger Wattenhofer
RAID
2009
Springer
15 years 8 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter
EICS
2009
ACM
15 years 8 months ago
Interactive usability instrumentation
Usage data logged from user interactions can be extremely valuable for evaluating software usability. However, instrumenting software to collect usage data is a time-intensive tas...
Scott Bateman, Carl Gutwin, Nathaniel Osgood, Gord...