Sciweavers

2520 search results - page 380 / 504
» Model-checking behavioral programs
Sort
View
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
14 years 2 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
ROBOCUP
1999
Springer
109views Robotics» more  ROBOCUP 1999»
14 years 2 months ago
Layered Reactive Planning in the IALP Team
The main ideas behind the implementation of the IALP RoboCup team are discussed: an agent architecture made of a hierarchy of behaviors, which can be combined to obtain different ...
Antonio Cisternino, Maria Simi
IPPS
1998
IEEE
14 years 2 months ago
Toward Embedded Development from Advanced Khoros
Current practice in the design of application software for high-performance embedded computing systems is characterized by long development times, lack of interoperability with ot...
Joe Fogler, Thomas Robey, Mark Young
HOTOS
1997
IEEE
14 years 2 months ago
Building Diverse Computer Systems
Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advan...
Stephanie Forrest, Anil Somayaji, David H. Ackley
PARA
1998
Springer
14 years 2 months ago
Exploiting Visualization and Direct Manipulation to Make Parallel Tools More Communicative
Parallel tools rely on graphical techniques to improve the quality of user interaction. In this paper, we explore how visualization and direct manipulation can be exploited in para...
Cherri M. Pancake