Sciweavers

819 search results - page 127 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
IMC
2009
ACM
15 years 7 months ago
Internet optometry: assessing the broken glasses in internet reachability
Reachability is thought of as the most basic service provided by today’s Internet. Unfortunately, this does not imply that the community has a deep understanding of it. Research...
Randy Bush, Olaf Maennel, Matthew Roughan, Steve U...
QOSA
2010
Springer
15 years 4 months ago
Validating Model-Driven Performance Predictions on Random Software Systems
Abstract. Software performance prediction methods are typically validated by taking an appropriate software system, performing both performance predictions and performance measurem...
Vlastimil Babka, Petr Tuma, Lubomír Bulej
101
Voted
CCS
2007
ACM
15 years 6 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
ICML
2005
IEEE
16 years 1 months ago
Learning first-order probabilistic models with combining rules
Many real-world domains exhibit rich relational structure and stochasticity and motivate the development of models that combine predicate logic with probabilities. These models de...
Sriraam Natarajan, Prasad Tadepalli, Eric Altendor...
95
Voted
HICSS
2006
IEEE
163views Biometrics» more  HICSS 2006»
15 years 6 months ago
Learning Ranking vs. Modeling Relevance
The classical (ad hoc) document retrieval problem has been traditionally approached through ranking according to heuristically developed functions (such as tf.idf or bm25) or gene...
Dmitri Roussinov, Weiguo Fan