Sciweavers

2236 search results - page 305 / 448
» Intrusion detection techniques and approaches
Sort
View
PERCOM
2010
ACM
13 years 8 months ago
Towards automated verification of autonomous networks: A case study in self-configuration
In autonomic networks, the self-configuration of network entities is one of the most desirable properties. In this paper, we show how formal verification techniques can verify the ...
JaeSeung Song, Tiejun Ma, Peter R. Pietzuch
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
13 years 2 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
CADE
2011
Springer
12 years 10 months ago
Exploiting Symmetry in SMT Problems
Abstract. Methods exploiting problem symmetries have been very successful in several areas including constraint programming and SAT solving. We here recast a technique to enhance t...
David Déharbe, Pascal Fontaine, Stephan Mer...
POPL
2009
ACM
14 years 11 months ago
Static contract checking for Haskell
Program errors are hard to detect and are costly both to programmers who spend significant efforts in debugging, and for systems that are guarded by runtime checks. Static verific...
Dana N. Xu, Simon L. Peyton Jones, Koen Claessen
ICIAP
2001
Springer
14 years 10 months ago
Representing Volumetric Vascular Structures Using Curve Skeletons
This paper describes a technique to represent relevant information of tree-like structures in a compact way. The technique is general. In the application described here, the image...
Gabriella Sanniti di Baja, Ingela Nyström, St...