Computer systems continue to be at risk of attack by malicious software that are attached to email. Email has been determined to be the cause of 80% of computer virus infections. Millions of dollars are lost yearly due to the damage brought by malicious emails. Popular approaches toward the defense against malicious emails are antivirus scanners and server-based filters. Further, state-of-the-art methods are being employed to enhance security against malicious programs. However, despite efforts...
Topics: malicious emails, runtime monitoring, statechart assertions, formal specifications, Hidden Markov...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-427
Topics: explicit, sussman, control, steele, reasoning, knowledge, solver, rules, problem, goal, explicit...
3
3.0
May 6, 2020
05/20
by
Tim Ruffing
software
eye 3
favorite 0
comment 0
A proof-of-concept implementation of the accountable assertions scheme introduced in the research paper "Liar, Liar, Coins on Fire! — Penalizing Equivocation By Loss Of Bitcoins" by Tim Ruffing, Aniket Kate, Dominique Schröder (22nd Conference on Computer and Communications Security, ACM CCS 2015). From https://github.com/real-or-random/accas
Topics: Cryptography, Accountable Assertions
This thesis provides natural language requirements and associated formal specifications for an electric power grid. These specifications are the first step in using bounded constraint solving to detect early bleak states in an electric power grid system. We analyze several methods of software verification and validation including Theorem Proving, Model Checking, and Execution-based Model Checking before determining that Execution-based Model Checking is the most suitable for specifying...
Topics: run-time monitoring, statechart assertions, formal specifications, electric power grid, hidden...
Bell System Technical Journal, 60: 9. November 1981 pp 2157-2165. McDonald's Problem - An Example of Using Dijkstra's Programming Method. (Sharma, D.K.)
Topics: program, solution, file, sum, loop, sequentially, print, assertions, nth, initialization, mcdonalds...
From the bitsavers.org collection, a scanned-in computer-related document. dec :: tech reports :: SRC-RR-7
Topics: process, algorithm, critical, executing, mutual, exclusion, memory, proof, true, assertions, mutual...
28
28
Dec 11, 2018
12/18
by
Wood, Peter
texts
eye 28
favorite 0
comment 0
A pamphlet on the formal and automated verification of programs, given as part of a second-year computer science course at the University of Cape Town.
Topics: assertions, program verification, programming, formal verification, correctness, specification,...
HUnit like assertions for QuickCheck This item contains old versions of the Arch Linux package for haskell-quickcheck-assertions . Website of the upstream project: https://github.com/s9gf4ult/quickcheck-assertions License: LGPL See the Arch Linux Archive documentation for details.
Topics: archlinux, archlinux package, haskell-quickcheck-assertions
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-673
Topics: cauldrons, cauldron, reasoning, frame, assertions, tlie, mechanism, knowledge, blocks, arc,...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-551
Topics: premise, node, assertion, tms, assertions, deduction, deduced, truth, august, die, premise...
11
11
texts
eye 11
favorite 0
comment 0
2010_4 Schools Assertions
Topic: 2010_4 Schools Assertions
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-1403
Topics: causal, object, event, events, traces, partial, pathfinder, assertions, jjl, light, event traces,...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AITR-291
Topics: spiro, tople, program, belief, tuation, creature, assertions, conniver, programs, data, natural...
29
29
audio
eye 29
favorite 0
comment 0
The increased use of IT in businesses created new challenges for auditors with increased IT risks. This presentation will talk about how does the increased reliance on IT by businesses affects the audit profession, first by analyzing the impact of IT on audit risks and how auditors should address such risks, then proceeding to discuss the impact of SOX on IT assurance, and discussion of other issues relating to auditorsâ assessment of IT General Controls (ITGC) in organizations.
Topics: Financial Assertions, IT Risks
From the bitsavers.org collection, a scanned-in computer-related document. mit :: lcs :: tr :: MIT-LCS-TR-551
Topics: performance, interval, intervals, event, pspec, events, assertions, assertion, log, aggregate,...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-324
Topics: eve, vision, intensity, symbolic, computation, assertions, visual, assertion, computational, image,...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-203a
Topics: theorem, theorems, planner, variable, lisp, failure, data, thprog, assertions, assigned, data base,...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-203
Topics: theorem, theorems, variable, lisp, planner, thprog, data, failure, assigned, assertions, data base,...
CIA Analytic Thinking and Presentation for Intelligence Analysis Training Handbook
Topics: official, core, analytic, analysis, assertion, intelligence, judgments, alternative, paragraph,...
Capturing and realizing the desired system-of-systems behavior in the traditional natural language development documents is a complex issue given that the legacy systems in a system-of-systems exhibit independent behaviors. As a result of a development strategy of interconnecting systems, the emergent behavior of the system-of-systems cannot be predicted. In our consideration of dependable software for a system-of-systems, we used our case study of the Ballistic Missile Defense System to study...
Topics: Contracts., System-of-systems, Dependable, Trustworthy, Architecture, Distributed system, Real-time...
91,836
92K
Jan 6, 2017
01/17
by
MIT OpenCourseWare
movies
eye 91,836
favorite 27
comment 0
MIT 6.0001 Introduction to Computer Science and Programming in Python, Fall 2016 View the complete course: http://ocw.mit.edu/6-0001F16 Instructor: Dr. Ana Bell 6.0001 Introduction to Computer Science and Programming in Python is intended for students with little or no programming experience. It aims to provide students with an understanding of the role computation can play in solving problems and to help students, regardless of their major, feel justifiably confident of their ability to write...
Topics: Computation, Branching, Iteration, Strings, Guess and check, Approximations, Bisection,...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AITR-503
Topics: program, reasoning, assertion, segment, dependency, input, object, temporal, output, assertions,...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-326
Topics: edges, bar, edge, parsing, image, figure, sharp, mask, sources, measurements, sharp edges, close...
28
28
Jul 30, 2019
07/19
by
Dr. Morris Murray, Jr.
texts
eye 28
favorite 0
comment 0
This is an original outlined study guide to the New Testament book of Second Corinthians. In the introductory section, there is pertinent info about the city of Corinth, the origin of Paul's Corinthian letters, the date, and theme of Second Corinthians. There is a three-fold major division of the letter with sub-divisions consisting of sectional summaries. All chapters and verses of this letter are included, although it is not a typical verse by verse commentary.
Topics: Principles of Christian ministry, Christian giving (examples and enthusiasm), resistance,...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-399
Topics: symbolic, assertions, impure, conceptual, actor, queuees, queues, evaluation, contract, figure,...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: lcs :: tr :: MIT-LCS-TR-124
Topics: loop, null, assertion, program, record, data, invariant, component, proof, assertions, record...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-475
Topics: sleuth, sentinel, wheat, rule, demand, erase, assertions, carryover, sentinels, sensor, wheat...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-561
Topics: viewpoint, assertions, sprite, parallel, goal, activity, arc, antecedent, sprites, subgoal, problem...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AITR-347
Topics: goal, assertions, assertion, theorem, prove, reasoning, procedural, antecedent, deductive,...
Processes are a fundamental component of most activities undertaken by humans. In software engineering and information assurance, in particular, it is important that processes be understandable, documented, and repeatable so as to ensure that the process outcomes are consistent and predictable. This dissertation provides a novel approach to process creation, documentation, checking, and maintenance that applies mathematical formalism to the engineering of processes that rely in large measure on...
Topics: Software Engineering, Information Assurance, Process Modeling, Statechart Assertions, Formal...
28
28
texts
eye 28
favorite 0
comment 0
Texts
Topics: Trailblazers, Schools assertions
Although there is voluminous data flow in social media, it is still possible to create an effective system that can detect malicious activities within a shorter time and provide situational awareness. This thesis developed patterns for a probabilistic approach to identify malicious behavior by monitoring big data. We collected twenty-two thousand tweets from publicly available Twitter data and used them in our testing and validation processes. We combined deterministic and nondeterministic...
Topics: formal specifications, hidden Markov model, hidden data, twitter, runtime verification, runtime...