Sciweavers

1091 search results - page 154 / 219
» The State of Cognitive Systems Engineering
Sort
View
COMPSAC
2005
IEEE
14 years 2 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
KBSE
2005
IEEE
14 years 2 months ago
Learning to verify branching time properties
We present a new model checking algorithm for verifying computation tree logic (CTL) properties. Our technique is based on using language inference to learn the fixpoints necessar...
Abhay Vardhan, Mahesh Viswanathan
IUI
2004
ACM
14 years 2 months ago
Designing example-critiquing interaction
In many practical scenarios, users are faced with the problem of choosing the most preferred outcome from a large set of possibilities. As people are unable to sift through them m...
Boi Faltings, Pearl Pu, Marc Torrens, Paolo Viappi...
RE
2004
Springer
14 years 2 months ago
Fluent-Based Animation: Exploiting the Relation between Goals and Scenarios for Requirements Validation
Scenarios and goals are effective and popular techniques for requirements definition. Validation is essential in order to ensure that they represent what stakeholders actually wan...
Sebastián Uchitel, Robert Chatley, Jeff Kra...
AC
1999
Springer
14 years 1 months ago
Enhancing Replica Management Services to Cope with Group Failures
In a distributed system, replication of components, such as objects, is a well known way of achieving availability. For increased availability, crashed and disconnected components...
Paul D. Ezhilchelvan, Santosh K. Shrivastava