Sciweavers

9 search results - page 1 / 2
» ase 2011
Sort
View
ASE
2011
12 years 11 months ago
Flexible feature binding in software product lines
Marko Rosenmüller, Norbert Siegmund, Sven Ape...
ICC
2011
IEEE
206views Communications» more  ICC 2011»
12 years 4 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
ASE
2011
12 years 11 months ago
Compositional model checking of software product lines using variation point obligations
This paper introduces a technique for incremental and compositional model checking that allows efficient reuse of model-checking results associated with the features in a product l...
Jing Liu, Samik Basu, Robyn R. Lutz
PAM
2011
Springer
12 years 7 months ago
Internet Censorship in China: Where Does the Filtering Occur?
China filters Internet traffic in and out of the country. In order to circumvent the firewall, it is helpful to know where the filtering occurs. In this work, we explore the AS-...
Xueyang Xu, Zhuoqing Morley Mao, J. Alex Halderman