نتایج جستجو برای: specification based detection

تعداد نتایج: 3365367  

2007
César Muñoz

Type theory is a mathematical technique widely used in computer science. In the formal methods community, type theory is at the basis of expressive specification languages and powerful proof assistant tools based on higher-order logic. From a practical point of view, type theory has been used to improve the quality of software systems by enabling the detection of errors before they become run-t...

1997
Guangtian Liu Aloysius K. Mok

Many distributed systems use events for asynchronous communication. Although the CORBA Event Service provides a flexible model for event-based communication among objects, further work is needed to support the important features required by real-time applications such as network management, avionics, etc. where timely delivery of events and more complex event correlation are desirable. In this ...

2007
Marcin Zalewski Sibylle Schupp

With the recent developments in the C++ language, concepts are mostly discussed as a form of constrained polymorphism. Yet, concepts also allow for an alternative, implementation-independent view that comes from their origin in (algebraic) specification languages. In this paper, we return to this specification view on concepts and formalize C++ concepts as institutions, a well-established notio...

2012
Prashant Kumar Singh A. K. Vatsa Reetu Sharma Priyanka Tyagi

A intrusion provides an unauthorized access, damage or disruption of the network. The process can understand the characteristics and nature of an intruder. The paper presents the taxonomy consists of the specification of an intruder. Taxonomy provides the classification of intruder and provides mechanism for intruder detection. We found the algorithm for developing an intruder which can be atta...

1994
D. A. Simser R. E. Seviora

With the critical role played by software systems in the operation of telecommunications networks, the ability to detect and report software failures has become of great importance. This paper presents the failure detection approach of real-time supervision based on the belief method. Real-time supervision allows failures in a software system to be detected in real-time based only on boundary s...

2005
Weiqiang Kong Kazuhiro Ogata Kokichi Futatsugi

Security considerations, such as role-based access control (RBAC) mechanism and separation of duty (SoD) constraints, are important and integral to workflow systems. We propose the use of an equation-based method – the OTS/CafeOBJ method to specify workflow systems with such security considerations, and verify some desired safety and liveness properties of workflow systems. Specifically, a work...

2009
Pedro D. Salgueiro Salvador Abreu

Network Monitoring and Intrusion Detection Systems plays an important role in today’s computer networks health, allowing the diagnosis and detection of anomalous situations on the network that could damage the performance and put the security of users data in risk if not detected or diagnosed in time to take any necessary measures. In this paper we present a preliminary specification and analys...

2009
Lionel Clément Kim Gerdes Renaud Marlet

This article presents the central algorithm of an open system for grammar checking, based on deep parsing. The grammatical specification is a context-free grammar with flat feature structures. After a shared-forest analysis where feature agreement constraints are relaxed, error detection globally minimizes the number of corrections and alternative correct sentences are automatically proposed.

Amirhossein Amiri Babak Abbasi Erfaneh Nikzad

The manufacturing operations often involve multistage processes where the process capability of each stage is affected by the process capability of its precedent processes. This property is known as the cascade property. The purpose of this paper is to estimate the process capability of the second stage of two-stage process while the cascade property impact is removed using residuals analysis. ...

1999
Roland Büschkes Mark Borning Dogan Kesdogan

The increasing complexity of both tele and data communication networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse by inand outsiders is becoming more and more difficult. This paper deals with a new technique that appears to be suitable for solving these issues, i.e. anomaly detection based on the specification of transactions...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید