Sciweavers

1541 search results - page 217 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
PERCOM
2010
ACM
14 years 11 months ago
Towards ontology-driven development of applications for smart environments
—In the environments where heterogeneous devices need to share information, utilize services of each other, and participate as components in various smart applications, it is com...
Artem Katasonov, Marko Palviainen
71
Voted
ISSTA
2006
ACM
15 years 6 months ago
Breaking up is hard to do: an investigation of decomposition for assume-guarantee reasoning
Finite-state verification techniques are often hampered by the stateexplosion problem. One proposed approach for addressing this problem is assume-guarantee reasoning. Using rece...
Jamieson M. Cobleigh, George S. Avrunin, Lori A. C...
110
Voted
WORM
2003
15 years 2 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
116
Voted
AAI
2005
117views more  AAI 2005»
15 years 16 days ago
Machine Learning in Hybrid Hierarchical and Partial-Order Planners for Manufacturing Domains
The application of AI planning techniques to manufacturing systems is being widely deployed for all the tasks involved in the process, from product design to production planning an...
Susana Fernández, Ricardo Aler, Daniel Borr...
91
Voted
PERCOM
2006
ACM
16 years 6 days ago
Balancing Autonomy and User Control in Context-Aware Systems - a Survey
Application autonomy can reduce interactions with users, ease the use of the system, and decrease user distraction. On the other hand, users may feel loss of control over their ap...
Bob Hardian, Jadwiga Indulska, Karen Henricksen