Sciweavers

407 search results - page 24 / 82
» An Automated Verification Method for Distributed Systems Sof...
Sort
View
IJSEKE
2011
141views more  IJSEKE 2011»
13 years 1 days ago
Risk Assessment in Multi-disciplinary (Software+) Engineering Projects
Software systems in safety-critical industrial automation systems, such as power plants and steel mills, become increasingly large, complex, and distributed. For assessing risks, l...
Stefan Biffl, Thomas Moser, Dietmar Winkler
AAAI
2004
13 years 10 months ago
Interactive Information Extraction with Constrained Conditional Random Fields
Information Extraction methods can be used to automatically "fill-in" database forms from unstructured data such as Web documents or email. State-of-the-art methods have...
Trausti T. Kristjansson, Aron Culotta, Paul A. Vio...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
JIPS
2010
195views more  JIPS 2010»
13 years 3 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
IPPS
1999
IEEE
14 years 28 days ago
Mechanical Verification of a Garbage Collector
Abstract. We describe how the PVS verification system has been used to verify a safety property of a garbage collection algorithm, originally suggested by Ben-Ari. The safety prope...
Klaus Havelund