Sciweavers

1626 search results - page 243 / 326
» The method evaluation model: a theoretical model for validat...
Sort
View
STACS
1999
Springer
14 years 5 days ago
The Weakness of Self-Complementation
Model checking is a method for the verification of systems with respect to their specifications. Symbolic model-checking, which enables the verification of large systems, procee...
Orna Kupferman, Moshe Y. Vardi
DASFAA
2004
IEEE
156views Database» more  DASFAA 2004»
13 years 11 months ago
Automatic Generation of SQLX View Definitions from ORA-SS Views
Abstract. Although XML is the dominant standard for publishing and exchanging data for Internet-based business applications, data is typically stored in relational or object-relati...
Ya Bing Chen, Tok Wang Ling, Mong-Li Lee
NOCS
2007
IEEE
14 years 2 months ago
Fast, Accurate and Detailed NoC Simulations
Network-on-Chip (NoC) architectures have a wide variety of parameters that can be adapted to the designer’s requirements. Fast exploration of this parameter space is only possib...
Pascal T. Wolkotte, Philip K. F. Hölzenspies,...
TON
2010
204views more  TON 2010»
13 years 2 months ago
Passive Diagnosis for Wireless Sensor Networks
Network diagnosis, an essential research topic for traditional networking systems, has not received much attention for wireless sensor networks. Existing sensor debugging tools li...
Yunhao Liu, Kebin Liu, Mo Li
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 10 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...