Results 1 - 10
of
43
FPGA INSPIRED BY BIOLOGICAL PROCESSES
, 1998
"... Special-purpose parallel systems, and in particular cellular SIMD (Single-Instruction Multiple-Data-Stream) and SPMD (Single-Program Multiple-Data-Stream) array processors are very interesting approaches for handling many computationally-intensive applications. These systems consist of an array of i ..."
Abstract
- Add to MetaCart
of such systems is usually measured in months, if not years, while the cost of custom VLSI circuits makes such designs too expensive for most situations. A major goal of the Embryonics project, the research project which provides the framework for this thesis, is the development of such an array of processors
A Bio-Inspired Approach for Self-Protecting an Organic Middleware with Artificial Antibodies
- In Self-Organising Systems, First International Workshop (IWSOS 2006
, 2006
"... Abstract. Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our research we are going to transfer some techniques of a biological immune system to a computer based environment. ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
Abstract. Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our research we are going to transfer some techniques of a biological immune system to a computer based environment
Functional Programming Way to Interact with Software Attacks and Vulnerabilities
"... Abstract—This paper proposes using functional programming style in a way to respond to detection of and interaction with the software attacks and vulnerabilities. Additionally, our approach considers involving Description Logics, as a basis for the use of the Semantic Web and meta-programming to pro ..."
Abstract
- Add to MetaCart
-programming to produce executable ontologies and to enable semantic reasoning over behavior and interaction with software attacks and vulnerabilities. Accordingly, we introduce Magic Potion, a recently defined Domain Specific meta-Language that uses Modeling Spaces framework to study heterogeneous modeling and meta
QOS WITH RELIABILITY AND SCALABILITY IN ADAPTIVE SERVICE-BASED SYSTEMS
"... Service-based systems that are dynamically composed at runtime to provide complex, adaptive functionality are currently one of the main development paradigms in software engineering. However, the Quality of Service (QoS) delivered by these systems remains an important concern, and needs to be manage ..."
Abstract
- Add to MetaCart
to be managed in an equally adaptive and predictable way. To address this need, we introduce a novel, tool-supported framework for the development of adaptive servicebased systems called QoSMOS (QoS Management and Optimization of Service-based systems). QoSMOS can be used to develop service-based systems
A grid portal for solving geoscience problems using distributed knowledge discovery services, Future Generation Computer Systems
"... This paper describes our research effort to employ Grid technologies to enable the development of geoscience applications by integrating workflow technologies with data mining resources and a portal framework in unique work environment called MOSÈ. Using MOSÈ, a user can easily compose and execute ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
This paper describes our research effort to employ Grid technologies to enable the development of geoscience applications by integrating workflow technologies with data mining resources and a portal framework in unique work environment called MOSÈ. Using MOSÈ, a user can easily compose
Eliminating The Middleman: Peer-to-Peer Dataflow
- In Proceedings of HPDC
, 2008
"... Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflows, centralised servers common to standard workflow systems can become a bottleneck to performance. However, standards-ba ..."
Abstract
-
Cited by 10 (3 self)
- Add to MetaCart
Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflows, centralised servers common to standard workflow systems can become a bottleneck to performance. However, standards
A Tool-based Semantic Framework for Security Requirements Specification
"... Abstract: Attaining high quality in security requirements specification requires first-rate professional expertise, which is scarce. In fact, most organisations do not include core security experts in their software team. This scenario motivates the need for adequate tool support for security requi ..."
Abstract
- Add to MetaCart
Requirements Engineering (SRE) A requirement is "a condition or capability that must be met by the system to solve a problem or achieve an objective" [IEEE Std. 98 It is a nine-step process consisting of the following activities: 1) agree on definitions; 2) identify vulnerable and/or critical assets
2007, ‘Human Attentional Networks: A Connectionist Model
- J Cogn Neurosci
"... & Recent evidence in cognitive neuroscience has suggested that attention is a complex organ system subserved by at least three attentional networks in the brain, for alerting, orienting, and executive control functions. However, how these different networks work together to give rise to the seem ..."
Abstract
-
Cited by 14 (1 self)
- Add to MetaCart
& Recent evidence in cognitive neuroscience has suggested that attention is a complex organ system subserved by at least three attentional networks in the brain, for alerting, orienting, and executive control functions. However, how these different networks work together to give rise
Automatic program repair with evolutionary computation,”
- Commun. ACM,
, 2010
"... Abstract There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work combining program analysis methods with evolutionary computation to automatically repair bugs in off-th ..."
Abstract
-
Cited by 34 (5 self)
- Add to MetaCart
typical software project. In this paper, we describe how to combine this problem by combining program analysis methods with evolutionary computation to automatically repair bugs in off-the-shelf legacy C programs. Genetic programming (GP) is a computational method inspired by biological evolution which
The Effectiveness of Estimates of Kolmogorov Complexity to Identify Semantic Types
"... Abstract — Identification of vulnerabilities in an information system is a critical component of information assurance. State-ofthe-art vulnerability analysis techniques require maintenance of a database of known attacks. These databases are updated with new attack signatures only after systems have ..."
Abstract
- Add to MetaCart
system components. The main contribution of this research is to suggest a fundamental and universally applicable vulnerability analysis framework that does not wait for attackers to innovate attacks before vulnerabilities are identified. This new framework proactively identifies system components
Results 1 - 10
of
43