Jeffrey J. P. Tsai

Learn More
Machine learning deals with the issue of how to build programs that improve their performance at some task through experience. Machine learning algorithms have proven to be of great practical value in a variety of application domains. They are particularly useful for (a) poorly understood problem domains where little knowledge exists for the humans to(More)
The state-explosion problem of formal verification has obstructed its application to large-scale software systems. In this article, we introduce a set of new condensation theories: IOT-failure equivalence, IOT-state equivalence, and firing-dependence theory to cope with this problem. Our condensation theories are much weaker than current theories used for(More)
An intrusion detection system (IDS) is a security layer to detect ongoing intrusive activities in computer systems and networks. Current IDS have two main problems: The first problem is that typically so many alarms are generated as to overwhelm the system operator, many of these being false alarms. The second problem is that continuous tuning of the(More)
Security system architecture governs the composition of components in security systems and interactions between them. It plays a central role in the design of software security systems that ensure secure access to distributed resources in networked environment. In particular, the composition of the systems must consistently assure security policies that it(More)
Reactive oxygen metabolites may contribute to the development of end-stage renal disease (ESRD) in diabetic and hypertensive patients. In this study, we used multiplex polymerase chain reaction (PCR) to analyze polymorphisms of two endogenous antioxidant genes, glutathione S-transferase M1 (GSTM1) and glutathione S-transferase T1 (GSTT1), and to determine(More)