Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Systems Architecture

Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro Dec 2012

Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro

David LO

A number of techniques that infer finite state automata from execution traces have been used to support test and analysis activities. Some of these techniques can produce automata that integrate information about the data-flow, that is, they also represent how data values affect the operations executed by programs. The integration of information about operation sequences and data values into a unique model is indeed conceptually useful to accurately represent the behavior of a program. However, it is still unclear whether handling heterogeneous types of information, such as operation sequences and data values, necessarily produces higher quality models or not. In …


At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci Oct 2012

At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci

Robert A Iannucci

No abstract provided.


Nort: Runtime Anomaly-Based Monitoring Of Malicious Behavior For Windows, Narcisa Andrea Milea, Siau-Cheng Khoo, David Lo, Cristi Pop Dec 2011

Nort: Runtime Anomaly-Based Monitoring Of Malicious Behavior For Windows, Narcisa Andrea Milea, Siau-Cheng Khoo, David Lo, Cristi Pop

David LO

Protecting running programs from exploits has been the focus of many host-based intrusion detection systems. To this end various formal methods have been developed that either require manual construction of attack signatures or modelling of normal program behavior to detect exploits. In terms of the ability to discover new attacks before the infection spreads, the former approach has been found to be lacking in flexibility. Consequently, in this paper, we present an anomaly monitoring system, NORT, that verifies on-the-fly whether running programs comply to their expected normal behavior. The model of normal behavior is based on a rich set of …


Bug Signature Minimization And Fusion, David Lo, Hong Cheng, Xiaoyin Wang Dec 2011

Bug Signature Minimization And Fusion, David Lo, Hong Cheng, Xiaoyin Wang

David LO

Debugging is a time-consuming activity. To help in debugging, many approaches have been proposed to pinpoint the location of errors given labeled failures and correct executions. While such approaches have been shown to be accurate, at times the location alone is not sufficient in helping programmers understand why the bug happens and how to fix it. Furthermore, a single location might not be powerful enough to discriminate failures from correct executions. To address the above challenges, there have been recent studies on extracting bug signatures which are composed of multiple locations appearing together in a particular order signifying an occurrence …


Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn Mar 2010

Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn

Tobias Hahn

Everybody knows there is potential to make big money in the stock market. But what most people don't know is how to go about it. This book will guide you step-by-step through the authors' tried and tested method for building rule-based stockmarket trading systems. It shows you how to design, test and trade a rule-based system.

It differs from other books in that it takes a scientific approach to developing trading systems, based on what others have done before. This book reviews previous work, and shows that some of it is gold dust because it provides information about what works …


Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn Mar 2010

Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn

Bruce Vanstone

Everybody knows there is potential to make big money in the stock market. But what most people don't know is how to go about it. This book will guide you step-by-step through the authors' tried and tested method for building rule-based stockmarket trading systems. It shows you how to design, test and trade a rule-based system.

It differs from other books in that it takes a scientific approach to developing trading systems, based on what others have done before. This book reviews previous work, and shows that some of it is gold dust because it provides information about what works …


Embedded Systems As Datacenters, Robert Iannucci Dec 2009

Embedded Systems As Datacenters, Robert Iannucci

Robert A Iannucci

No abstract provided.


Platform Thinking In Embedded Systems, Robert Iannucci Dec 2004

Platform Thinking In Embedded Systems, Robert Iannucci

Robert A Iannucci

No abstract provided.


Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart Dec 2000

Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart

Robert A Iannucci

No abstract provided.


Computer System For Simulating Physical Processes Using Multiple Integer State Vectors Us:5594671, Hudong Chen, Peter Churchill, Robert Iannucci, Kim Molvig, Gregory Papadopoulos, Stephen Remondi, Christopher Teixeira, Kenneth Traub Dec 1996

Computer System For Simulating Physical Processes Using Multiple Integer State Vectors Us:5594671, Hudong Chen, Peter Churchill, Robert Iannucci, Kim Molvig, Gregory Papadopoulos, Stephen Remondi, Christopher Teixeira, Kenneth Traub

Robert A Iannucci

No abstract provided.


System For Synchronizing Execution By A Processing Element Of Threads Within A Process Using A State Indicator Us:5553305, Robert Iannucci, Steven Gregor Dec 1995

System For Synchronizing Execution By A Processing Element Of Threads Within A Process Using A State Indicator Us:5553305, Robert Iannucci, Steven Gregor

Robert A Iannucci

No abstract provided.


Multithreaded Computer Architecture: A Summary Of The State Of The Art, Robert Iannucci, Guang Gao, Robert Halstead, Burton Smith Dec 1993

Multithreaded Computer Architecture: A Summary Of The State Of The Art, Robert Iannucci, Guang Gao, Robert Halstead, Burton Smith

Robert A Iannucci

No abstract provided.


High Performance Memory System Pct:Ep0199134, Robert Iannucci Dec 1991

High Performance Memory System Pct:Ep0199134, Robert Iannucci

Robert A Iannucci

No abstract provided.


Parallel Machines: Parallel Machine Languages, Robert Iannucci Dec 1989

Parallel Machines: Parallel Machine Languages, Robert Iannucci

Robert A Iannucci

No abstract provided.


Method And Apparatus For Division Pct:Ep0075745, Robert Iannucci, James Kleinsteiber Dec 1986

Method And Apparatus For Division Pct:Ep0075745, Robert Iannucci, James Kleinsteiber

Robert A Iannucci

No abstract provided.


High Performance Memory System Utilizing Pipelining Techniques Us:4685088, Robert Iannucci Dec 1986

High Performance Memory System Utilizing Pipelining Techniques Us:4685088, Robert Iannucci

Robert A Iannucci

No abstract provided.


Method And Apparatus For Division Employing Associative Memory Us:4466077, Robert Iannucci, James Kleinsteiber Dec 1983

Method And Apparatus For Division Employing Associative Memory Us:4466077, Robert Iannucci, James Kleinsteiber

Robert A Iannucci

No abstract provided.