Sciweavers

1634 search results - page 217 / 327
» Reasoning about Knowledge Using Rough Sets
Sort
View
NSPW
2004
ACM
14 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ECRTS
1999
IEEE
14 years 2 months ago
Handling sporadic tasks in off-line scheduled distributed real-time systems
Many industrial applications mandate the use of a timetriggered paradigm and consequently the use of off-line scheduling for reasons such as predictability, certification, cost, o...
Damir Isovic, Gerhard Fohler
FASE
2009
Springer
14 years 2 months ago
Interface Generation and Compositional Verification in JavaPathfinder
Abstract. We present a novel algorithm for interface generation of software components. Given a component, our algorithm uses learning techniques to compute a permissive interface ...
Dimitra Giannakopoulou, Corina S. Pasareanu
ECAI
2004
Springer
14 years 2 months ago
Configuration of Web Services as Parametric Design
Abstract. The configuration of Web services is particularly hard given the heterogeneous, unreliable and open nature of the Web. Furthermore, such composite Web services are likely...
Annette ten Teije, Frank van Harmelen, Bob J. Wiel...
IESA
2007
13 years 12 months ago
Application Development with Virtual Teams: Models and Metrics
Increased performance is the key reason for developing software with virtual teams but the research efforts to date are limited. Difficulties for a formal, generic approach are mul...
D. Radoiu