Sciweavers

1005 search results - page 143 / 201
» Patterns for Refinement Automation
Sort
View
NMR
2004
Springer
14 years 2 months ago
A resource bounded default logic
This paper presents statistical default logic, an expansion of classical (i.e., Reiter) default logic that allows us to model common inference patterns found in standard inferenti...
Gregory R. Wheeler
IEEEARES
2010
IEEE
14 years 2 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
DISCEX
2003
IEEE
14 years 2 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong
ICCBR
2003
Springer
14 years 2 months ago
An Evaluation of the Usefulness of Case-Based Explanation
: One of the perceived benefits of Case-Based Reasoning (CBR) is the potential to use retrieved cases to explain predictions. Surprisingly, this aspect of CBR has not been much res...
Padraig Cunningham, Dónal Doyle, John Lough...
ITC
1999
IEEE
118views Hardware» more  ITC 1999»
14 years 1 months ago
Logic BIST for large industrial designs: real issues and case studies
This paper discusses practical issues involved in applying logic built-in self-test (BIST) to four large industrial designs. These multi-clock designs, ranging in size from 200K t...
Graham Hetherington, Tony Fryars, Nagesh Tamarapal...