Sciweavers

4502 search results - page 817 / 901
» Regular Model Checking
Sort
View
SIGSOFT
2010
ACM
13 years 7 months ago
Software for everyone by everyone
Given the dizzying pace of change in computer science, trying to look too far into the future of software engineering is hard. However, it might be possible to predict the future ...
Tevfik Bultan
VLSID
2010
IEEE
155views VLSI» more  VLSID 2010»
13 years 7 months ago
Synchronized Generation of Directed Tests Using Satisfiability Solving
Directed test generation is important for the functional verification of complex system-on-chip designs. SAT based bounded model checking is promising for counterexample generatio...
Xiaoke Qin, Mingsong Chen, Prabhat Mishra
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 7 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
ICDM
2009
IEEE
150views Data Mining» more  ICDM 2009»
13 years 7 months ago
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection
Anomaly detection is an important data mining task. Most existing methods treat anomalies as inconsistencies and spend the majority amount of time on modeling normal instances. A r...
Xiao Yu, Lu An Tang, Jiawei Han
ICIP
2009
IEEE
13 years 7 months ago
Multichannel dual domain infrared target tracking for highly evolutionary target signatures
We introduce a new SIR particle filter that performs tracking in a joint feature space where pixel domain data are fused with measurements obtained from an 18-channel modulation d...
Colin M. Johnston, Nick A. Mould, Joseph P. Havlic...