Sciweavers

1520 search results - page 246 / 304
» Applying adaptation design patterns
Sort
View
DSN
2007
IEEE
14 years 2 months ago
Automatic Verification and Discovery of Byzantine Consensus Protocols
Model-checking of asynchronous distributed protocols is challenging because of the large size of the state and solution spaces. This paper tackles this problem in the context of l...
Piotr Zielinski
DATE
2004
IEEE
129views Hardware» more  DATE 2004»
14 years 2 months ago
Modeling Shared Resource Contention Using a Hybrid Simulation/Analytical Approach
Future Systems-on-Chips will include multiple heterogeneous processing units, with complex data-dependent shared resource access patterns dictating the performance of a design. Cu...
Alex Bobrek, Joshua J. Pieper, Jeffrey E. Nelson, ...
ETRICS
2006
14 years 2 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
GECCO
2006
Springer
198views Optimization» more  GECCO 2006»
14 years 2 months ago
Autonomous evolutionary music composer
A second-generation autonomous music composition tool is developed using Genetic Algorithms. The composition is conducted in two Stages. The first Stage generates and identifies m...
Yaser M. A. Khalifa, Mohamed Basel Al-Mourad
ICES
2000
Springer
140views Hardware» more  ICES 2000»
14 years 2 months ago
Evolving Cellular Automata for Self-Testing Hardware
Testing is a key issue in the design and production of digital circuits: the adoption of BIST (Built-In Self-Test) techniques is increasingly popular, but requires efficient algori...
Fulvio Corno, Matteo Sonza Reorda, Giovanni Squill...