Sciweavers

1268 search results - page 251 / 254
» Verifying distributed systems: the operational approach
Sort
View
ANCS
2006
ACM
14 years 3 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
ATAL
2005
Springer
14 years 3 months ago
Kaa: policy-based explorations of a richer model for adjustable autonomy
Though adjustable autonomy is hardly a new topic in agent systems, there has been a general lack of consensus on terminology and basic concepts. In this paper, we describe the mul...
Jeffrey M. Bradshaw, Hyuckchul Jung, Shriniwas Kul...
EUROCAST
1997
Springer
156views Hardware» more  EUROCAST 1997»
14 years 1 months ago
A Computational Model for Visual Size, Location and Movement
The ability to detect object size, location and movement is essential for a visual system in either a biological or man made environment. In this paper we present a model for esti...
Miguel Alemán-Flores, K. Nicholas Leibovic,...
VLDB
2002
ACM
131views Database» more  VLDB 2002»
13 years 9 months ago
ProTDB: Probabilistic Data in XML
Whereas traditional databases manage only deterministic information, many applications that use databases involve uncertain data. This paper presents a Probabilistic Tree Data Bas...
Andrew Nierman, H. V. Jagadish
SIGSOFT
2007
ACM
14 years 10 months ago
Efficient checkpointing of java software using context-sensitive capture and replay
Checkpointing and replaying is an attractive technique that has been used widely at the operating/runtime system level to provide fault tolerance. Applying such a technique at the...
Guoqing Xu, Atanas Rountev, Yan Tang, Feng Qin