Sciweavers

1202 search results - page 199 / 241
» Sortings for Reactive Systems
Sort
View
DAC
2004
ACM
16 years 18 days ago
Abstraction of assembler programs for symbolic worst case execution time analysis
ion of Assembler Programs for Symbolic Worst Case Execution Time Analysis Tobias Schuele Tobias.Schuele@informatik.uni-kl.de Klaus Schneider Klaus.Schneider@informatik.uni-kl.de Re...
Klaus Schneider, Tobias Schüle
HICSS
2000
IEEE
133views Biometrics» more  HICSS 2000»
15 years 4 months ago
Research, Development, and Demonstration Needs for Large-Scale, Reliability-Enhancing, Integration of Distributed Energy Resourc
Distributed energy resources (DER) are in transition from the lab to the marketplace. The defining characteristic of DER is that they are active devices installed at the distribut...
Joseph Eto, Vikram Budhraja, Carlos Martinez, Jim ...
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 3 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
AC
2005
Springer
14 years 11 months ago
The state of artificial intelligence
Artificial intelligence has been an active branch of research for computer scientists and psychologists for 50 years. The concept of mimicking human intelligence in a computer fue...
Adrian A. Hopgood
ACSAC
2008
IEEE
15 years 6 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...