Sciweavers

386 search results - page 52 / 78
» Modeling Intrusion Detection Systems Using Linear Genetic Pr...
Sort
View
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
14 years 2 months ago
Designs for Ramp-Constrained Day-Ahead Auctions
— Some electric power markets allow bidders to specify constraints on ramp rates for increasing or decreasing power production. We show in a small example that a bidder could use...
Shmuel S. Oren, Andrew M. Ross
EMSOFT
2009
Springer
14 years 3 months ago
Compositional deadlock detection for rendezvous communication
Concurrent programming languages are growing in importance with the advent of multi-core systems. However, concurrent programs suffer from problems, such as data races and deadloc...
Baolin Shao, Nalini Vasudevan, Stephen A. Edwards
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
14 years 8 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
13 years 9 months ago
Inverse modeling for open boundary conditions in channel network
Abstract-- An inverse modeling problem for systems governed by first-order, hyperbolic partial differential equations subject to periodic forcing is investigated. The problem is de...
Qingfang Wu, Mohammad Rafiee, Andrew Tinka, Alexan...
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
14 years 1 months ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...