Sciweavers

550 search results - page 31 / 110
» A lightweight approach to state based security testing
Sort
View
SIGSOFT
2007
ACM
15 years 10 months ago
State space exploration using feedback constraint generation and Monte-Carlo sampling
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
RTCSA
2006
IEEE
15 years 3 months ago
Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems
Real-time embedded systems are increasingly being networked. In distributed real-time embedded applications, e.g., electric grid management and command and control applications, i...
Kyoung-Don Kang, Sang Hyuk Son
PAMI
2006
183views more  PAMI 2006»
14 years 9 months ago
A Model-Based Approach for Estimating Human 3D Poses in Static Images
Estimating human body poses in static images is important for many image understanding applications including semantic content extraction and image database query and retrieval. Th...
Mun Wai Lee, Isaac Cohen
70
Voted
ISCA
2010
IEEE
340views Hardware» more  ISCA 2010»
15 years 2 months ago
Necromancer: enhancing system throughput by animating dead cores
Aggressive technology scaling into the nanometer regime has led to a host of reliability challenges in the last several years. Unlike onchip caches, which can be efficiently prot...
Amin Ansari, Shuguang Feng, Shantanu Gupta, Scott ...
SAS
2000
Springer
15 years 1 months ago
A Transformational Approach for Generating Non-linear Invariants
Computing invariants is the key issue in the analysis of infinite-state systems whether analysis means testing, verification or parameter synthesis. In particular, methods that all...
Saddek Bensalem, Marius Bozga, Jean-Claude Fernand...