Sciweavers

877 search results - page 121 / 176
» Model Based Development of Safety-Critical Systems Using Tem...
Sort
View
COMPSAC
2005
IEEE
14 years 2 months ago
Using AOP to Monitor and Administer Software for Grid Computing Environments
Monitoring is a task of collecting measurements that reflect the state of a system. Administration is a collection of tasks for control and manipulation of computer systems. Monito...
Mark Grechanik, Dewayne E. Perry, Don S. Batory
ICSE
2010
IEEE-ACM
13 years 11 months ago
SMT-based bounded model checking for multi-threaded software in embedded systems
The transition from single-core to multi-core processors has made multi-threaded software an important subject over the last years in computer-aided verification. Model checkers ...
Lucas Cordeiro
JAIR
2010
181views more  JAIR 2010»
13 years 3 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
DATE
2006
IEEE
123views Hardware» more  DATE 2006»
14 years 3 months ago
Constructing portable compiled instruction-set simulators: an ADL-driven approach
Instruction set simulators are common tools used for the development of new architectures and embedded software among countless other functions. This paper presents a framework th...
Joseph D'Errico, Wei Qin
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
11 years 11 months ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...