Sciweavers

819 search results - page 67 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
COLT
2008
Springer
15 years 2 months ago
Model Selection and Stability in k-means Clustering
Clustering Stability methods are a family of widely used model selection techniques applied in data clustering. Their unifying theme is that an appropriate model should result in ...
Ohad Shamir, Naftali Tishby
133
Voted
ACSAC
2000
IEEE
15 years 5 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
91
Voted
WCET
2010
14 years 10 months ago
Realism in Statistical Analysis of Worst Case Execution Times
This paper considers the use of Extreme Value Theory (EVT) to model worst-case execution times. In particular it considers the sacrifice that statistical methods make in the reali...
David Griffin, Alan Burns
FORTE
2004
15 years 2 months ago
Formal Composition of Distributed Scenarios
Eliciting, modeling, and analyzing the requirements are the main challenges to face up when you want to produce a formal specification for distributed systems. The distribution and...
Aziz Salah, Rabeb Mizouni, Rachida Dssouli, Benoit...
98
Voted
ICSOC
2009
Springer
15 years 7 months ago
An Automatic Approach to Enable Replacement of Conversational Services
Abstract. In Service Oriented Architectures (SOAs) services invoked in a composition can be replaced by other services, which are possibly discovered and bound at runtime. Most of ...
Luca Cavallaro, Elisabetta Di Nitto, Matteo Pradel...