Sciweavers

1541 search results - page 285 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
IFIP
2001
Springer
15 years 4 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
ISVLSI
2008
IEEE
142views VLSI» more  ISVLSI 2008»
15 years 6 months ago
A Fuzzy Approach for Variation Aware Buffer Insertion and Driver Sizing
In nanometer regime, the effects of process variations are dominating circuit performance, power and reliability of circuits. Hence, it is important to properly manage variation e...
Venkataraman Mahalingam, Nagarajan Ranganathan
111
Voted
RAID
1999
Springer
15 years 4 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
143
Voted
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
16 years 25 days ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
WSC
2000
15 years 1 months ago
Cost/benefit analysis of interval jumping in power-control simulation
Computation of power control calculations is one of the most time-consuming aspects of simulating wireless communication systems. These calculations are critical to understanding ...
David M. Nicol, L. Felipe Perrone