• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 43
Next 10 →

FPGA INSPIRED BY BIOLOGICAL PROCESSES

by Fƒdƒrale De Lausanne, Gianluca Tempesti, Prof Giovanni Coray, Gianluca Tempesti, A Self-repairing, Multiplexer-based Fpga, Inspired Biological Processes , 1998
"... Special-purpose parallel systems, and in particular cellular SIMD (Single-Instruction Multiple-Data-Stream) and SPMD (Single-Program Multiple-Data-Stream) array processors are very interesting approaches for handling many computationally-intensive applications. These systems consist of an array of i ..."
Abstract - Add to MetaCart
of such systems is usually measured in months, if not years, while the cost of custom VLSI circuits makes such designs too expensive for most situations. A major goal of the Embryonics project, the research project which provides the framework for this thesis, is the development of such an array of processors

A Bio-Inspired Approach for Self-Protecting an Organic Middleware with Artificial Antibodies

by Andreas Pietzowski, Benjamin Satzger, Wolfgang Trumler, Theo Ungerer - In Self-Organising Systems, First International Workshop (IWSOS 2006 , 2006
"... Abstract. Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our research we are going to transfer some techniques of a biological immune system to a computer based environment. ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
Abstract. Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our research we are going to transfer some techniques of a biological immune system to a computer based environment

Functional Programming Way to Interact with Software Attacks and Vulnerabilities

by Violeta Damjanovic, Dragan Djuric
"... Abstract—This paper proposes using functional programming style in a way to respond to detection of and interaction with the software attacks and vulnerabilities. Additionally, our approach considers involving Description Logics, as a basis for the use of the Semantic Web and meta-programming to pro ..."
Abstract - Add to MetaCart
-programming to produce executable ontologies and to enable semantic reasoning over behavior and interaction with software attacks and vulnerabilities. Accordingly, we introduce Magic Potion, a recently defined Domain Specific meta-Language that uses Modeling Spaces framework to study heterogeneous modeling and meta

QOS WITH RELIABILITY AND SCALABILITY IN ADAPTIVE SERVICE-BASED SYSTEMS

by V. Rhymend, Uthariaraj P. Mercy, Florence A. Geetha
"... Service-based systems that are dynamically composed at runtime to provide complex, adaptive functionality are currently one of the main development paradigms in software engineering. However, the Quality of Service (QoS) delivered by these systems remains an important concern, and needs to be manage ..."
Abstract - Add to MetaCart
to be managed in an equally adaptive and predictable way. To address this need, we introduce a novel, tool-supported framework for the development of adaptive servicebased systems called QoSMOS (QoS Management and Optimization of Service-based systems). QoSMOS can be used to develop service-based systems

A grid portal for solving geoscience problems using distributed knowledge discovery services, Future Generation Computer Systems

by Gianluigi Folino, Agostino Forestiero, Giandomenico Spezzano
"... This paper describes our research effort to employ Grid technologies to enable the development of geoscience applications by integrating workflow technologies with data mining resources and a portal framework in unique work environment called MOSÈ. Using MOSÈ, a user can easily compose and execute ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
This paper describes our research effort to employ Grid technologies to enable the development of geoscience applications by integrating workflow technologies with data mining resources and a portal framework in unique work environment called MOSÈ. Using MOSÈ, a user can easily compose

Eliminating The Middleman: Peer-to-Peer Dataflow

by Adam Barker, Jon B. Weissman, Jano Van Hemert - In Proceedings of HPDC , 2008
"... Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflows, centralised servers common to standard workflow systems can become a bottleneck to performance. However, standards-ba ..."
Abstract - Cited by 10 (3 self) - Add to MetaCart
Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflows, centralised servers common to standard workflow systems can become a bottleneck to performance. However, standards

A Tool-based Semantic Framework for Security Requirements Specification

by Olawande Daramola , Guttorm Sindre , Thomas Moser
"... Abstract: Attaining high quality in security requirements specification requires first-rate professional expertise, which is scarce. In fact, most organisations do not include core security experts in their software team. This scenario motivates the need for adequate tool support for security requi ..."
Abstract - Add to MetaCart
Requirements Engineering (SRE) A requirement is "a condition or capability that must be met by the system to solve a problem or achieve an objective" [IEEE Std. 98 It is a nine-step process consisting of the following activities: 1) agree on definitions; 2) identify vulnerable and/or critical assets

2007, ‘Human Attentional Networks: A Connectionist Model

by Hongbin Wang, Jin Fan - J Cogn Neurosci
"... & Recent evidence in cognitive neuroscience has suggested that attention is a complex organ system subserved by at least three attentional networks in the brain, for alerting, orienting, and executive control functions. However, how these different networks work together to give rise to the seem ..."
Abstract - Cited by 14 (1 self) - Add to MetaCart
& Recent evidence in cognitive neuroscience has suggested that attention is a complex organ system subserved by at least three attentional networks in the brain, for alerting, orienting, and executive control functions. However, how these different networks work together to give rise

Automatic program repair with evolutionary computation,”

by Stephanie Forrest , Westley Weimer , Stephanie Forrest , Claire Le Goues , Thanhvu Nguyen - Commun. ACM, , 2010
"... Abstract There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work combining program analysis methods with evolutionary computation to automatically repair bugs in off-th ..."
Abstract - Cited by 34 (5 self) - Add to MetaCart
typical software project. In this paper, we describe how to combine this problem by combining program analysis methods with evolutionary computation to automatically repair bugs in off-the-shelf legacy C programs. Genetic programming (GP) is a computational method inspired by biological evolution which

The Effectiveness of Estimates of Kolmogorov Complexity to Identify Semantic Types

by unknown authors
"... Abstract — Identification of vulnerabilities in an information system is a critical component of information assurance. State-ofthe-art vulnerability analysis techniques require maintenance of a database of known attacks. These databases are updated with new attack signatures only after systems have ..."
Abstract - Add to MetaCart
system components. The main contribution of this research is to suggest a fundamental and universally applicable vulnerability analysis framework that does not wait for attackers to innovate attacks before vulnerabilities are identified. This new framework proactively identifies system components
Next 10 →
Results 1 - 10 of 43
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University