Sciweavers

950 search results - page 138 / 190
» Constraint Based Resilience Analysis
Sort
View
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
JSS
2007
75views more  JSS 2007»
13 years 7 months ago
A rationale-based architecture model for design traceability and reasoning
Large systems often have a long life-span and comprise many intricately related elements. The verification and maintenance of these systems require a good understanding of their ...
Antony Tang, Yan Jin, Jun Han
CORR
2004
Springer
119views Education» more  CORR 2004»
13 years 7 months ago
On Role Logic
We present role logic, a notation for describing properties of relational structures in shape analysis, databases, and knowledge bases. We construct role logic using the ideas of ...
Viktor Kuncak, Martin C. Rinard
AAMAS
2000
Springer
13 years 7 months ago
Synthesizing Coordination Requirements for Heterogeneous Autonomous Agents
Abstract. As agents move into ever more important applications, there is a natural growth in interest in techniques for synthesizing multiagent systems. We describe an approach for...
Munindar P. Singh
JSS
2002
90views more  JSS 2002»
13 years 7 months ago
Producing reliable software: an experiment
A customer of high assurance software recently sponsored a software engineering experiment in which a small real-time software system was developed concurrently by two popular sof...
Carol Smidts, Xin Huang, James C. Widmaier