Sciweavers

1228 search results - page 220 / 246
» Techniques for Reactive System Design: The Tools in TRADE
Sort
View
DSN
2005
IEEE
14 years 4 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ATVA
2005
Springer
132views Hardware» more  ATVA 2005»
14 years 3 months ago
Flat Counter Automata Almost Everywhere!
Abstract. This paper argues that flatness appears as a central notion in the verification of counter automata. A counter automaton is called flat when its control graph can be ...
Jérôme Leroux, Grégoire Sutre
WAC
2005
Springer
118views Communications» more  WAC 2005»
14 years 3 months ago
Experiments on the Automatic Evolution of Protocols Using Genetic Programming
Truly autonomic networks ultimately require self-modifying, evolving protocol software. Otherwise humans must intervene in every situation that has not been anticipated at design t...
Lidia Yamamoto, Christian F. Tschudin
WOSS
2004
ACM
14 years 3 months ago
Towards a knowledge-based approach to architectural adaptation management
Self-adaptive software continually evaluates and modifies its own behavior to meet changing demands. One of the key issues in constructing such software is that of planning when a...
John C. Georgas, Richard N. Taylor
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
14 years 3 months ago
Towards Verifying Parametrised Hardware Libraries with Relative Placement Information
Abstract— This paper presents a framework for verifying compilation tools for parametrised hardware libraries with placement information. Such libraries are captured in Pebble, a...
Steve McKeever, Wayne Luk, Arran Derbyshire