Sciweavers

20 search results - page 3 / 4
» Automatic Patch-Based Exploit Generation is Possible: Techni...
Sort
View
BMCBI
2008
119views more  BMCBI 2008»
13 years 5 months ago
On deducing causality in metabolic networks
Background: Metabolic networks present a complex interconnected structure, whose understanding is in general a non-trivial task. Several formal approaches have been developed to s...
Chiara Bodei, Andrea Bracciali, Davide Chiarugi
EVOW
2001
Springer
13 years 9 months ago
ARPIA: A High-Level Evolutionary Test Signal Generator
The integrated circuits design flow is rapidly moving towards higher description levels. However, test-related activities are lacking behind this trend, mainly since effective faul...
Fulvio Corno, Gianluca Cumani, Matteo Sonza Reorda...
CCS
2007
ACM
13 years 11 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
GECCO
2007
Springer
174views Optimization» more  GECCO 2007»
13 years 11 months ago
Investigating data-flow coverage of classes using evolutionary algorithms
It is not unusual for a software development organization to expend 40 percent of total project effort on testing, which can be a very laborious and time-consuming process. Thus, ...
Konstantinos Liaskos, Marc Roper, Murray Wood
ISCAS
2006
IEEE
106views Hardware» more  ISCAS 2006»
13 years 11 months ago
Integrating observability don't cares in all-solution SAT solvers
— All-solution Boolean satisfiability (SAT) solvers are engines employed to find all the possible solutions to a SAT problem. Their applications are found throughout the EDA in...
Sean Safarpour, Andreas G. Veneris, Rolf Drechsler