Sciweavers

2236 search results - page 312 / 448
» Intrusion detection techniques and approaches
Sort
View
ICRA
2007
IEEE
130views Robotics» more  ICRA 2007»
14 years 3 months ago
The Cost of Reality: Effects of Real-World Factors on Multi-Robot Search
— Designing algorithms for multi-robot systems can be a complex and difficult process: the cost of such systems can be very high, collecting experimental data can be timeconsumi...
Jim Pugh, Alcherio Martinoli
CAV
2007
Springer
112views Hardware» more  CAV 2007»
14 years 3 months ago
Context-Bounded Analysis of Multithreaded Programs with Dynamic Linked Structures
Bounded context switch reachability analysis is a useful and efficient approach for detecting bugs in multithreaded programs. In this paper, we address the application of this app...
Ahmed Bouajjani, Séverine Fratani, Shaz Qad...
ICSM
2006
IEEE
14 years 3 months ago
On the Use of Line Co-change for Identifying Crosscutting Concern Code
Crosscutting concerns are software system features whose implementation is spread across many modules as tangled and scattered code. Identifying such code helps developers to chan...
Gerardo Canfora, Luigi Cerulo, Massimiliano Di Pen...
SARA
2005
Springer
14 years 2 months ago
Compositional Derivation of Symmetries for Constraint Satisfaction
This paper reconsiders the problems of discovering symmetries in constraint satisfaction problems (CSPs). It proposes a compositional approach which derives symmetries of the appli...
Pascal Van Hentenryck, Pierre Flener, Justin Pears...
GCB
2004
Springer
139views Biometrics» more  GCB 2004»
14 years 2 months ago
Conserved RNA Pseudoknots
: Pseudoknots are essential for the functioning of many small RNA molecules. In addition, viral RNAs often exhibit pseudoknots that are required at various stages of the viral life...
C. Thurner, Ivo L. Hofacker, Peter F. Stadler