Sciweavers

1890 search results - page 378 / 378
» Model-Based Testing in Practice
Sort
View
IACR
2011
86views more  IACR 2011»
12 years 5 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
POPL
2012
ACM
12 years 27 days ago
Sound predictive race detection in polynomial time
Data races are among the most reliable indicators of programming errors in concurrent software. For at least two decades, Lamport’s happens-before (HB) relation has served as th...
Yannis Smaragdakis, Jacob Evans, Caitlin Sadowski,...
INFOCOM
2012
IEEE
11 years 7 months ago
Towards energy-fairness in asynchronous duty-cycling sensor networks
Abstract—In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. ...
Zhenjiang Li, Mo Li, Yunhao Liu
SIGMETRICS
2012
ACM
248views Hardware» more  SIGMETRICS 2012»
11 years 7 months ago
Pricing cloud bandwidth reservations under demand uncertainty
In a public cloud, bandwidth is traditionally priced in a pay-asyou-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a n...
Di Niu, Chen Feng, Baochun Li
BMCBI
2008
88views more  BMCBI 2008»
13 years 5 months ago
Large-scale identification of polymorphic microsatellites using an in silico approach
Background: Simple Sequence Repeat (SSR) or microsatellite markers are valuable for genetic research. Experimental methods to develop SSR markers are laborious, time consuming and...
Jifeng Tang, Samantha J. Baldwin, Jeanne M. E. Jac...