Sciweavers

620 search results - page 72 / 124
» Abstract Analysis of Symbolic Executions
Sort
View
98
Voted
WCNC
2010
IEEE
15 years 4 months ago
Joint Optimization of Power Allocation and Relay Deployment in Wireless Sensor Networks
—We study the problem of optimizing the symbol error probability (SEP) performance of cluster-based cooperative wireless sensor networks (WSNs). It is shown in the literature tha...
Mohammad Abdizadeh, Hadi Jamali Rad, Bahman Abolha...
132
Voted
SEKE
2010
Springer
14 years 11 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
CHI
2006
ACM
16 years 29 days ago
Beyond record and play: backpacks: tangible modulators for kinetic behavior
Digital Manipulatives embed computation in familiar children's toys and provide means for children to design behavior. Some systems use "record and play" as a form ...
Hayes Raffle, Amanda J. Parkes, Hiroshi Ishii, Jos...
WADS
2001
Springer
182views Algorithms» more  WADS 2001»
15 years 5 months ago
On the Complexity of Scheduling Conditional Real-Time Code
Abstract. Many real-time embedded systems involve a collection of independently executing event-driven code blocks, having hard real-time constraints. Portions of such codes when t...
Samarjit Chakraborty, Thomas Erlebach, Lothar Thie...
111
Voted
ESOP
2006
Springer
15 years 4 months ago
A Typed Assembly Language for Confidentiality
Language-based information-flow analysis is promising in protecting data confidentiality. Although much work has been carried out in this area, relatively little has been done for ...
Dachuan Yu, Nayeem Islam