Sciweavers

3765 search results - page 651 / 753
» Formal Methods for Systems Engineering Behavior Models
Sort
View
129
Voted
IMC
2009
ACM
15 years 9 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
CC
2008
Springer
15 years 4 months ago
Generating SIMD Vectorized Permutations
Abstract. This paper introduces a method to generate efficient vectorized implementations of small stride permutations using only vector load and vector shuffle instructions. These...
Franz Franchetti, Markus Püschel
EICS
2009
ACM
15 years 7 months ago
Adapting ubicomp software and its evaluation
We describe work in progress on tools and infrastructure to support adaptive component-based software for mobile devices— in our case, Apple iPhones. Our high level aim is ‘de...
Malcolm Hall, Marek Bell, Alistair Morrison, Stuar...
CSIE
2009
IEEE
15 years 9 months ago
A Metamodel for Tracing Non-functional Requirements
The tendency for Non-Functional Requirements (NFRs) to have a wide-ranging impact on a software system, and the strong interdependencies and tradeoffs that exist between NFRs and ...
Mohamad Kassab, Olga Ormandjieva, Maya Daneva
183
Voted
POPL
2005
ACM
16 years 2 months ago
Environmental acquisition revisited
In 1996, Gil and Lorenz proposed programming language constructs for specifying environmental acquisition in addition to inheritance acquisition for objects. They noticed that in ...
Richard Cobbe, Matthias Felleisen