Sciweavers

4693 search results - page 57 / 939
» Verifying Hybrid Systems
Sort
View
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 5 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
108
Voted
HYBRID
2005
Springer
15 years 6 months ago
Adjoint-Based Optimal Control of the Expected Exit Time for Stochastic Hybrid Systems
Abstract. In this paper, we study the problem of controlling the expected exit time from a region for a class of stochastic hybrid systems. That is, we find the least costly feedb...
Robin L. Raffard, Jianghai Hu, Claire Tomlin
ATAL
2008
Springer
15 years 2 months ago
A flexible framework for verifying agent programs
There is an increasing number of agent-oriented programming languages that have working interpreters and platforms, with significant progress in the quality of such platforms over...
Louise A. Dennis, Berndt Farwer, Rafael H. Bordini...
109
Voted
RAID
2007
Springer
15 years 6 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
IJCAI
1989
15 years 1 months ago
A Correct Non-Monotonic ATMS
In this paper, we investigate technical methods to deal with exceptions, inconsistencies, and ambiguity. Existing reason maintenance systems are only suitable for some of these pr...
Ulrich Junker