Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 17 of 17
Full-Text Articles in Systems Architecture
Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro
Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro
David LO
A number of techniques that infer finite state automata from execution traces have been used to support test and analysis activities. Some of these techniques can produce automata that integrate information about the data-flow, that is, they also represent how data values affect the operations executed by programs. The integration of information about operation sequences and data values into a unique model is indeed conceptually useful to accurately represent the behavior of a program. However, it is still unclear whether handling heterogeneous types of information, such as operation sequences and data values, necessarily produces higher quality models or not. In …
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
Robert A Iannucci
No abstract provided.
Nort: Runtime Anomaly-Based Monitoring Of Malicious Behavior For Windows, Narcisa Andrea Milea, Siau-Cheng Khoo, David Lo, Cristi Pop
Nort: Runtime Anomaly-Based Monitoring Of Malicious Behavior For Windows, Narcisa Andrea Milea, Siau-Cheng Khoo, David Lo, Cristi Pop
David LO
Protecting running programs from exploits has been the focus of many host-based intrusion detection systems. To this end various formal methods have been developed that either require manual construction of attack signatures or modelling of normal program behavior to detect exploits. In terms of the ability to discover new attacks before the infection spreads, the former approach has been found to be lacking in flexibility. Consequently, in this paper, we present an anomaly monitoring system, NORT, that verifies on-the-fly whether running programs comply to their expected normal behavior. The model of normal behavior is based on a rich set of …
Bug Signature Minimization And Fusion, David Lo, Hong Cheng, Xiaoyin Wang
Bug Signature Minimization And Fusion, David Lo, Hong Cheng, Xiaoyin Wang
David LO
Debugging is a time-consuming activity. To help in debugging, many approaches have been proposed to pinpoint the location of errors given labeled failures and correct executions. While such approaches have been shown to be accurate, at times the location alone is not sufficient in helping programmers understand why the bug happens and how to fix it. Furthermore, a single location might not be powerful enough to discriminate failures from correct executions. To address the above challenges, there have been recent studies on extracting bug signatures which are composed of multiple locations appearing together in a particular order signifying an occurrence …
Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn
Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn
Tobias Hahn
Everybody knows there is potential to make big money in the stock market. But what most people don't know is how to go about it. This book will guide you step-by-step through the authors' tried and tested method for building rule-based stockmarket trading systems. It shows you how to design, test and trade a rule-based system.
It differs from other books in that it takes a scientific approach to developing trading systems, based on what others have done before. This book reviews previous work, and shows that some of it is gold dust because it provides information about what works …
Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn
Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn
Bruce Vanstone
Everybody knows there is potential to make big money in the stock market. But what most people don't know is how to go about it. This book will guide you step-by-step through the authors' tried and tested method for building rule-based stockmarket trading systems. It shows you how to design, test and trade a rule-based system.
It differs from other books in that it takes a scientific approach to developing trading systems, based on what others have done before. This book reviews previous work, and shows that some of it is gold dust because it provides information about what works …
Embedded Systems As Datacenters, Robert Iannucci
Embedded Systems As Datacenters, Robert Iannucci
Robert A Iannucci
No abstract provided.
Platform Thinking In Embedded Systems, Robert Iannucci
Platform Thinking In Embedded Systems, Robert Iannucci
Robert A Iannucci
No abstract provided.
Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart
Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart
Robert A Iannucci
No abstract provided.
Computer System For Simulating Physical Processes Using Multiple Integer State Vectors Us:5594671, Hudong Chen, Peter Churchill, Robert Iannucci, Kim Molvig, Gregory Papadopoulos, Stephen Remondi, Christopher Teixeira, Kenneth Traub
Computer System For Simulating Physical Processes Using Multiple Integer State Vectors Us:5594671, Hudong Chen, Peter Churchill, Robert Iannucci, Kim Molvig, Gregory Papadopoulos, Stephen Remondi, Christopher Teixeira, Kenneth Traub
Robert A Iannucci
No abstract provided.
System For Synchronizing Execution By A Processing Element Of Threads Within A Process Using A State Indicator Us:5553305, Robert Iannucci, Steven Gregor
System For Synchronizing Execution By A Processing Element Of Threads Within A Process Using A State Indicator Us:5553305, Robert Iannucci, Steven Gregor
Robert A Iannucci
No abstract provided.
Multithreaded Computer Architecture: A Summary Of The State Of The Art, Robert Iannucci, Guang Gao, Robert Halstead, Burton Smith
Multithreaded Computer Architecture: A Summary Of The State Of The Art, Robert Iannucci, Guang Gao, Robert Halstead, Burton Smith
Robert A Iannucci
No abstract provided.
High Performance Memory System Pct:Ep0199134, Robert Iannucci
High Performance Memory System Pct:Ep0199134, Robert Iannucci
Robert A Iannucci
No abstract provided.
Parallel Machines: Parallel Machine Languages, Robert Iannucci
Parallel Machines: Parallel Machine Languages, Robert Iannucci
Robert A Iannucci
No abstract provided.
Method And Apparatus For Division Pct:Ep0075745, Robert Iannucci, James Kleinsteiber
Method And Apparatus For Division Pct:Ep0075745, Robert Iannucci, James Kleinsteiber
Robert A Iannucci
No abstract provided.
High Performance Memory System Utilizing Pipelining Techniques Us:4685088, Robert Iannucci
High Performance Memory System Utilizing Pipelining Techniques Us:4685088, Robert Iannucci
Robert A Iannucci
No abstract provided.
Method And Apparatus For Division Employing Associative Memory Us:4466077, Robert Iannucci, James Kleinsteiber
Method And Apparatus For Division Employing Associative Memory Us:4466077, Robert Iannucci, James Kleinsteiber
Robert A Iannucci
No abstract provided.