Sciweavers

1187 search results - page 134 / 238
» On Modeling Cross-Talk Faults
Sort
View
ICSE
2007
IEEE-ACM
14 years 9 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
ICDCSW
2002
IEEE
14 years 1 months ago
Extended Minimal Routing in 2-D Meshes with Faulty Blocks
In this paper, several enhanced sufficient conditions are given for minimal routing in 2-dimensional (2-D) meshes with faulty nodes contained in a set of disjoint faulty blocks. ...
Jie Wu, Zhen Jiang
AICCSA
2006
IEEE
121views Hardware» more  AICCSA 2006»
13 years 10 months ago
Software Defect Prediction Using Regression via Classification
In this paper we apply a machine learning approach to the problem of estimating the number of defects called Regression via Classification (RvC). RvC initially automatically discr...
Stamatia Bibi, Grigorios Tsoumakas, Ioannis Stamel...
SAC
2006
ACM
14 years 2 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
14 years 2 months ago
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures
It is now apparent that our nation’s infrastructures and essential utilities have been optimized for reliability in benign operating environments. As such, they are susceptible ...
Axel W. Krings, Paul W. Oman