-
3
-
-
77954341184
-
An approach to synthesise safe systems
-
September
-
A. Jhumka, F. Freiling, C. Fetzer, and N. Suri, "An approach to synthesise safe systems," International Journal of Security and Networks, vol. 1, no. 1, pp. 62-74, September 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1
, pp. 62-74
-
-
Jhumka, A.1
Freiling, F.2
Fetzer, C.3
Suri, N.4
-
4
-
-
0031123369
-
Fault injection techniques and tools
-
M. Hsueh, T. K. Tsai, and R. K. Iyer, "Fault injection techniques and tools," IEEE Computer, vol. 30, no. 4, pp. 75-82, April 1997. (Pubitemid 127546072)
-
(1997)
Computer
, vol.30
, Issue.4
, pp. 75-82
-
-
Hsueh, M.-C.1
Tsai, T.K.2
Iyer, R.K.3
-
5
-
-
0029252185
-
Estimators for fault tolerance coverage evaluation
-
June
-
D. Powell, E. Martins, J. Arlat, and Y. Crouzet, "Estimators for fault tolerance coverage evaluation," IEEE Transactions on Computers, vol. 44, no. 2, pp. 261-274, June 1995.
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.2
, pp. 261-274
-
-
Powell, D.1
Martins, E.2
Arlat, J.3
Crouzet, Y.4
-
7
-
-
0035789169
-
Reducing critical failures for control algorithms using executable assertions and best effort recovery
-
July
-
J. Vinter, J. Aidemark, P. Folkesson, and J. Karlsson, "Reducing critical failures for control algorithms using executable assertions and best effort recovery," in Proceedings of the 37th IEEE/IFIP International Conference on Dependable Systems and Networks, July 2001, pp. 347-356.
-
(2001)
Proceedings of the 37th IEEE/IFIP International Conference on Dependable Systems and Networks
, pp. 347-356
-
-
Vinter, J.1
Aidemark, J.2
Folkesson, P.3
Karlsson, J.4
-
8
-
-
0025414676
-
The use of self checks and voting in software error detection: An empirical study
-
April
-
N. G. Leveson, S. S. Cha, J. C. Knight, and T. J. Shimeall, "The use of self checks and voting in software error detection: An empirical study," IEEE Transactions on Software Engineering, vol. 16, no. 4, pp. 432-443, April 1990.
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.4
, pp. 432-443
-
-
Leveson, N.G.1
Cha, S.S.2
Knight, J.C.3
Shimeall, T.J.4
-
12
-
-
0036980151
-
Propane: An environment for examining the propagation of errors in software
-
July
-
M. Hiller, A. Jhumka, and N. Suri, "Propane: An environment for examining the propagation of errors in software," in Proceedings of the 11th ACM SIGSOFT International Symposium on Software Testing and Analysis, July 2002, pp. 81-85.
-
(2002)
Proceedings of the 11th ACM SIGSOFT International Symposium on Software Testing and Analysis
, pp. 81-85
-
-
Hiller, M.1
Jhumka, A.2
Suri, N.3
-
13
-
-
76749092270
-
The weka data mining software: An update
-
June
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, "The weka data mining software: An update," SIGKDD Explorations, vol. 11, no. 1, pp. 10-18, June 2009.
-
(2009)
SIGKDD Explorations
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
14
-
-
0035789176
-
An approach for analysing the propagation of data errors in software
-
July
-
M. Hiller, A. Jhumka, and N. Suri, "An approach for analysing the propagation of data errors in software," in Proceedings of the 31st IEEE/IFIP International Conference on Dependable Systems and Networks, July 2001, pp. 161-172.
-
(2001)
Proceedings of the 31st IEEE/IFIP International Conference on Dependable Systems and Networks
, pp. 161-172
-
-
Hiller, M.1
Jhumka, A.2
Suri, N.3
-
15
-
-
2942561082
-
An approach for designing and assessing detectors for dependable componentbased systems
-
March
-
A. Jhumka, M. Hiller, and N. Suri, "An approach for designing and assessing detectors for dependable componentbased systems," in Proceedings of the 8th IEEE International Symposium on High Assurance Systems Engineering, March 2004, pp. 69-78.
-
(2004)
Proceedings of the 8th IEEE International Symposium on High Assurance Systems Engineering
, pp. 69-78
-
-
Jhumka, A.1
Hiller, M.2
Suri, N.3
-
16
-
-
24944492963
-
A data mining approach to identify key factors in dependability experiments
-
Dependable Computing - EDCC 2005: 5th European Dependable Computing Conference, Proceedings
-
G. Pinter, H. Madeira, M. Vieira, A. Pataricza, and I. Majzik, "A data mining approach to identify key factors in dependability experiments in dependable computing," in Proceedings of the 5th European Dependable Computing Conference, March 2005, pp. 263-280. (Pubitemid 41312764)
-
(2005)
Lecture Notes in Computer Science
, vol.3463
, pp. 263-280
-
-
Pinter, G.1
Madeira, H.2
Vieira, M.3
Majzik, I.4
Pataricza, A.5
-
17
-
-
33745728475
-
Exploiting efficient data mining techniques to enhance intrusion detection systems
-
1506525, Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005
-
C.-T. Lu, A. P. Boedihardjo, and P. Manalwar, "Exploiting efficient data mining techniques to enhance intrusion detection systems," in Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, September 2005, pp. 512-517. (Pubitemid 43996599)
-
(2005)
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005
, vol.2005
, pp. 512-517
-
-
Lu, C.-T.1
Boedihardjo, A.P.2
Manalwar, P.3
-
21
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
January
-
P. Cousot and R. Cousot, "Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints," in Proceedings 6th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, January 1977, pp. 238-252.
-
(1977)
Proceedings 6th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
22
-
-
0035250541
-
Dynamically discovering likely program invariants to support program evolution
-
DOI 10.1109/32.908957
-
M. D. Ernst, J. Cockrell, W. G. Griswold, and D. Notkin, "Dynamically discovering likely program invariants to support program evolution," IEEE Transactions on Software Engineering, vol. 27, no. 2, pp. 99-123, February 2001. (Pubitemid 32254259)
-
(2001)
IEEE Transactions on Software Engineering
, vol.27
, Issue.2
, pp. 99-123
-
-
Ernst, M.D.1
Cockrell, J.2
Griswold, W.G.3
Notkin, D.4
-
23
-
-
34247373512
-
Inference and enforcement of data structure consistency specifications
-
May
-
B. Demsky, M. D. Ernst, P. J. Guo, S. McCamant, J. H. Perkins, and M. Rinard, "Inference and enforcement of data structure consistency specifications," in Proceedings of the International Symposium on Software Testing and Analysis, May 2006, pp. 233-244.
-
(2006)
Proceedings of the International Symposium on Software Testing and Analysis
, pp. 233-244
-
-
Demsky, B.1
Ernst, M.D.2
Guo, P.J.3
McCamant, S.4
Perkins, J.H.5
Rinard, M.6
-
24
-
-
53349128424
-
Using likely program invariants to detect hardware errors
-
June
-
S. K. Sahoo, M. Li, P. Ramachandran, S. V. Adve, V. S. Adve, and Y. Zhou, "Using likely program invariants to detect hardware errors," in Proceedings of the 38th IEEE/IFIP International Conference on Dependable Systems and Networks, June 2008, pp. 70-79.
-
(2008)
Proceedings of the 38th IEEE/IFIP International Conference on Dependable Systems and Networks
, pp. 70-79
-
-
Sahoo, S.K.1
Li, M.2
Ramachandran, P.3
Adve, S.V.4
Adve, V.S.5
Zhou, Y.6
-
26
-
-
0031998121
-
Machine learning for the detection of oil spills in satellite radar images
-
M. Kubat, R. C. Holte, and S. Matwin, "Machine learning for the detection of oil spills in satellite radar images," Machine Learning, vol. 30, no. 2-3, pp. 195-215, 1998.
-
(1998)
Machine Learning
, vol.30
, Issue.2-3
, pp. 195-215
-
-
Kubat, M.1
Holte, R.C.2
Matwin, S.3
-
27
-
-
33646023117
-
An introduction to roc analysis
-
June
-
T. Fawcett, "An introduction to roc analysis," Pattern Recognition Letters, vol. 27, no. 8, pp. 861-874, June 2006.
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
29
-
-
0003802343
-
-
Chapman and Hall/ CRC, January
-
L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stone, Classification and Regression Trees. Chapman and Hall/ CRC, January 1984.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
30
-
-
85041528332
-
Reducing misclassification costs
-
July
-
M. Pazzani, C. Merz, P. Murphy, K. Ali, T. Hume, and C. Brunk, "Reducing misclassification costs," in Proceedings of the 11th International Conference on Machine Learning, July 1994, pp. 217-225.
-
(1994)
Proceedings of the 11th International Conference on Machine Learning
, pp. 217-225
-
-
Pazzani, M.1
Merz, C.2
Murphy, P.3
Ali, K.4
Hume, T.5
Brunk, C.6
-
31
-
-
0036565589
-
An instance-weighting method to induce cost-sensitive trees
-
DOI 10.1109/TKDE.2002.1000348
-
K. M. Ting, "An instance-weighting method to induce costsensitive trees," IEEE Transactions on Knowledge and Data Engineering, vol. 14, no. 3, pp. 659-665, May 2002. (Pubitemid 34669622)
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.3
, pp. 659-665
-
-
Ting, K.M.1
-
33
-
-
0013316935
-
Misclassification cost-sensitive boosting
-
June
-
W. Fan, S. J. Stolfo, J. Zhang, and P. K. Chan, "Misclassification cost-sensitive boosting," in Proceedings of the 16th International Conference on Machine Learning, June 1999, pp. 97-105.
-
(1999)
Proceedings of the 16th International Conference on Machine Learning
, pp. 97-105
-
-
Fan, W.1
Stolfo, S.J.2
Zhang, J.3
Chan, P.K.4
-
37
-
-
0346586663
-
SMOTE: Synthetic minority over-sampling technique
-
N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, "Smote: Synthetic minority over-sampling technique," Journal of Artificial Intelligence Research, vol. 16, no. 1, pp. 321-357, May 2002. (Pubitemid 43057176)
-
(2002)
Journal of Artificial Intelligence Research
, vol.16
, pp. 321-357
-
-
Chawla, N.V.1
Bowyer, K.W.2
Hall, L.O.3
Kegelmeyer, W.P.4
-
38
-
-
33749245586
-
Cost-sensitive learning by cost-proportionate example weighting
-
July
-
B. Zadrozny, J. Langford, and N. Abe, "Cost-sensitive learning by cost-proportionate example weighting," in Proceedings of the 3rd IEEE International Conference on Data Mining, July, 2003, pp. 435-442.
-
(2003)
Proceedings of the 3rd IEEE International Conference on Data Mining
, pp. 435-442
-
-
Zadrozny, B.1
Langford, J.2
Abe, N.3
-
39
-
-
50549101751
-
Automatically countering imbalance and its empirical relationship to cost
-
February
-
N. V. Chawla, D. A. Cieslak, L. O. Hall, and A. Joshi, "Automatically countering imbalance and its empirical relationship to cost," Journal of Data Minining and Knowledge Discovery, vol. 17, no. 2, pp. 225-252, February 2008.
-
(2008)
Journal of Data Minining and Knowledge Discovery
, vol.17
, Issue.2
, pp. 225-252
-
-
Chawla, N.V.1
Cieslak, D.A.2
Hall, L.O.3
Joshi, A.4
-
40
-
-
80051939984
-
-
7-Zip, "http://www.7-zip.org/," 2010.
-
(2010)
-
-
-
41
-
-
80051924009
-
-
April
-
FlightGear, "http://www.flightgear.org/," April 2009.
-
(2009)
-
-
-
42
-
-
80051946861
-
-
Mp3Gain, "http://mp3gain.sourceforge.net/," 2010.
-
(2010)
-
-
|