Sciweavers

2374 search results - page 421 / 475
» The language of machines
Sort
View
FORMATS
2009
Springer
14 years 1 months ago
Safe Runtime Verification of Real-Time Properties
Abstract. Introducing a monitor on a system typically changes the system's behaviour by slowing the system down and increasing memory consumption. This may possibly result in ...
Christian Colombo, Gordon J. Pace, Gerardo Schneid...
ATVA
2006
Springer
158views Hardware» more  ATVA 2006»
14 years 28 days ago
Model-Based Tool-Chain Infrastructure for Automated Analysis of Embedded Systems
In many safety-critical applications of embedded systems, the system dynamics exhibits hybrid behaviors. To enable automatic analysis of these embedded systems, many analysis tools...
Hang Su, Graham Hemingway, Kai Chen, T. John Koo
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
14 years 28 days ago
Accuracy Estimation With Clustered Dataset
If the dataset available to machine learning results from cluster sampling (e.g. patients from a sample of hospital wards), the usual cross-validation error rate estimate can lead...
Ricco Rakotomalala, Jean-Hugues Chauchat, Fran&cce...
CCGRID
2006
IEEE
14 years 28 days ago
Compilation of XSLT into Dataflow Graphs for Web Service Composition
Our current research into programming models for parallel web services composition is targeted at providing mechanisms for obtaining higher throughput for large scale compute and ...
Peter M. Kelly, Paul D. Coddington, Andrew L. Wend...
CCS
2006
ACM
14 years 28 days ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...