Sciweavers

870 search results - page 20 / 174
» The failure detector abstraction
Sort
View
NFM
2011
223views Formal Methods» more  NFM 2011»
13 years 4 months ago
Generating Data Race Witnesses by an SMT-Based Analysis
Abstract. Data race is one of the most dangerous errors in multithreaded programming, and despite intensive studies, it remains a notorious cause of failures in concurrent systems....
Mahmoud Said, Chao Wang, Zijiang Yang, Karem Sakal...
IAW
2003
IEEE
14 years 2 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
ICARIS
2009
Springer
14 years 26 days ago
Efficient Algorithms for String-Based Negative Selection
Abstract. String-based negative selection is an immune-inspired classification scheme: Given a self-set S of strings, generate a set D of detectors that do not match any element of...
Michael Elberfeld, Johannes Textor
INFOCOM
2008
IEEE
14 years 3 months ago
A Backup Route Aware Routing Protocol - Fast Recovery from Transient Routing Failures
Abstract— As the Internet becomes the critical information infrastructure for both personal and business applications, survivable routing protocols need to be designed that maint...
Feng Wang, Lixin Gao
ECCV
2006
Springer
14 years 11 months ago
Machine Learning for High-Speed Corner Detection
Abstract Where feature points are used in real-time frame-rate applications, a high-speed feature detector is necessary. Feature detectors such as SIFT (DoG), Harris and SUSAN are ...
Edward Rosten, Tom Drummond