Sciweavers

422 search results - page 78 / 85
» Incremental Detection of Model Inconsistencies Based on Mode...
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
Calysto: scalable and precise extended static checking
Automatically detecting bugs in programs has been a long-held goal in software engineering. Many techniques exist, trading-off varying levels of automation, thoroughness of covera...
Domagoj Babic, Alan J. Hu
GLOBECOM
2008
IEEE
14 years 1 months ago
A Game Theoretic Framework for Distributed Self-Coexistence Among IEEE 802.22 Networks
—The cognitive radio based IEEE 802.22 wireless regional area network (WRAN) is designed to operate in the under–utilized TV bands by detecting and avoiding primary TV transmis...
Shamik Sengupta, R. Chandramouli, Swastik Brahma, ...
ICRE
1998
IEEE
13 years 11 months ago
Surfacing Root Requirements Interactions from Inquiry Cycle Requirements Documents
Systems requirements errors are numerous, persistent, and expensive. To detect such errors, and focus on critical ones during the development of a requirements document, we have d...
William N. Robinson, Suzanne D. Pawlowski
TPDS
2010
113views more  TPDS 2010»
13 years 2 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
IMC
2009
ACM
14 years 1 months ago
An analysis of packet sampling in the frequency domain
Packet sampling techniques introduce measurement errors that should be carefully handled in order to correctly characterize the network behavior. In the literature several works h...
Luigi Alfredo Grieco, Chadi Barakat