Biblio

Found 19604 results

2018-05-14
2018-05-23
Alur, Rajeev, Trivedi, Ashutosh, Wojtczak, Dominik.  2012.  Optimal Scheduling for Constant-rate Multi-mode Systems. Proceedings of the 15th ACM International Conference on Hybrid Systems: Computation and Control (HSCC '12). :75–84.
2015-11-23
Minas Charalambides, University of Illinois at Urbana-Champaign, Peter Dinges, University of Illinois at Urbana-Champaign, Gul Agha, University of Illinois at Urbana-Champaign.  2012.  Parameterized Concurrent Multi-Party Session Types. 11th International Workshop on Foundations of Coordination Languages and Self-Adaptive Systems (FOCLASA 2012). 91:16-30.

Session types have been proposed as a means of statically verifying implementations of communication protocols. Although prior work has been successful in verifying some classes of protocols, it does not cope well with parameterized, multi-actor scenarios with inherent asynchrony. For example, the sliding window protocol is inexpressible in previously proposed session type systems. This paper describes System-A, a new typing language which overcomes many of the expressiveness limitations of prior work. System-A explicitly supports asynchrony and parallelism, as well as multiple forms of parameterization. We define System-A and show how it can be used for the static verification of a large class of asynchronous communication protocols.

2018-05-14
2018-05-25
2018-05-27
Greg Castañón, Venkatesh Saligrama, André{-}Louis Caron, Pierre{-}Marc Jodoin.  2012.  Real-Time Activity Search of Surveillance Video. Ninth {IEEE} International Conference on Advanced Video and Signal-Based Surveillance, {AVSS} 2012, Beijing, China, September 18-21, 2012. :246–251.
2018-06-04
2018-05-23
Wang, Shaohui, Ayoub, Anaheed, Sokolsky, Oleg, Lee, Insup.  2012.  Runtime Verification of Traces Under Recording Uncertainty. Proceedings of the Second International Conference on Runtime Verification (RV'11). :442–456.
2018-05-27
Cem Aksoylar, George K. Atia, Venkatesh Saligrama.  2012.  Sample complexity of salient feature identification for sparse signal processing. {IEEE} Statistical Signal Processing Workshop, {SSP} 2012, Ann Arbor, MI, USA, August 5-8, 2012. :329–332.
Song Tan, Wen-Zhan Song, Dong, Qifen, Lang Tong.  2012.  SCORE: Smart-Grid Common Open Research Emulator. The 3rd IEEE International Conference on Smart Grid Communications (IEEE SmartGridComm).
2018-05-23
2018-05-27
Zachary Sun, W. Clem Karl, Prakash Ishwar, Venkatesh Saligrama.  2012.  Sensing aware dimensionality reduction for nearest neighbor classification of high dimensional signals. {IEEE} Statistical Signal Processing Workshop, {SSP} 2012, Ann Arbor, MI, USA, August 5-8, 2012. :405–408.
2018-05-23
2020-03-09
Farquharson, J., Wang, A., Howard, J..  2012.  Smart Grid Cyber Security and Substation Network Security. 2012 IEEE PES Innovative Smart Grid Technologies (ISGT). :1–5.

A successful Smart Grid system requires purpose-built security architecture which is explicitly designed to protect customer data confidentiality. In addition to the investment on electric power infrastructure for protecting the privacy of Smart Grid-related data, entities need to actively participate in the NIST interoperability framework process; establish policies and oversight structure for the enforcement of cyber security controls of the data through adoption of security best practices, personnel training, cyber vulnerability assessments, and consumer privacy audits.

2018-05-23
A. Ayoub, B. Kim, I. Lee, O. Sokolsky.  2012.  A Systematic Approach to Justifying Sufficient Confidence in Software Safety Arguments. International Conference on Computer Safety, Reliability and Security ({SAFECOMP 2012}).
2015-01-13
Breaux, Travis, Hibshi, Hanan, Rao, Ashwini, Lehker, Jean-Michel.  2012.  Towards a Framework for Pattern Experimentation: Understanding empirical validity in requirements engineering patterns. IEEE 2nd Workshop on Requirements Engineering Patterns (RePa'12).

Despite the abundance of information security guidelines, system developers have difficulties implementing technical solutions that are reasonably secure. Security patterns are one possible solution to help developers reuse security knowledge. The challenge is that it takes experts to develop security patterns. To address this challenge, we need a framework to identify and assess patterns and pattern application practices that are accessible to non-experts. In this paper, we narrowly define what we mean by patterns by focusing on requirements patterns and the considerations that may inform how we identify and validate patterns for knowledge reuse. We motivate this discussion using examples from the requirements pattern literature and theory in cognitive psychology.

2018-05-27
Agumbe Suresh, Mahima, Stoleru, Radu, Denton, Ron, Zechman, Emily, Shihada, Basem.  2012.  Towards Optimal Event Detection and Localization in Acyclic Flow Networks. Distributed Computing and Networking: 13th International Conference, ICDCN 2012, Hong Kong, China, January 3-6, 2012. Proceedings. :179–196.
Kirill Trapeznikov, Venkatesh Saligrama, David A. Castañón.  2012.  Two stage decision system. {IEEE} Statistical Signal Processing Workshop, {SSP} 2012, Ann Arbor, MI, USA, August 5-8, 2012. :920–923.
2018-05-14
2018-05-27
Venkatesh Saligrama, Zhu Chen.  2012.  Video anomaly detection based on local statistical aggregates. 2012 {IEEE} Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, June 16-21, 2012. :2112–2119.
Wen-Zhan Song, Debraj De, Song Tan, Sajal Das, Lang Tong.  2012.  A Wireless Smart Grid Testbed In Lab. Special Issue on Recent Advances in Wireless Technologies for Smart Grid, IEEE Wireless Communications Magazine. 19