Sciweavers

1916 search results - page 202 / 384
» Reconfiguring a state machine
Sort
View
ETRICS
2006
13 years 12 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
MA
2000
Springer
104views Communications» more  MA 2000»
13 years 11 months ago
Portable Support for Transparent Thread Migration in Java
In this paper, we present a mechanism to capture and reestablish the state of Java threads. We achieve this by extracting a thread's execution state from the application code ...
Eddy Truyen, Bert Robben, Bart Vanhaute, Tim Conin...
AIPS
2004
13 years 9 months ago
Complexity of Planning with Partial Observability
We show that for conditional planning with partial observability the existence problem of plans with success probability 1 is 2-EXP-complete. This result completes the complexity ...
Jussi Rintanen
CSREASAM
2004
13 years 9 months ago
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures
We model a private key's life cycle as a finite state machine. The states are the key's phases of life and the transition functions describe tasks to be done with the key...
Alexander Wiesmaier, Marcus Lippert, Vangelis Kara...
FORTE
1998
13 years 9 months ago
Exploiting Symmetry in Protocol Testing
Test generation and execution are often hampered by the large state spaces of the systems involved. In automata (or transition system) based test algorithms, taking advantage of s...
Judi Romijn, Jan Springintveld