Sciweavers

2947 search results - page 60 / 590
» Analyzing Program Analyses
Sort
View
117
Voted
DISCEX
2003
IEEE
15 years 7 months ago
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies
Under sponsorship of the Defense Advanced Research Projects Agency’s (DARPA) Fault Tolerant Networks (FTN) program, The Johns Hopkins University Applied Physics Laboratory (JHU/...
W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. ...
CMSB
2008
Springer
15 years 4 months ago
Analyzing a Discrete Model of Aplysia Central Pattern Generator
We present a discrete formal model of the central pattern generator (CPG) located in the buccal ganglia of Aplysia that is responsible for mediating the rhythmic movements of its f...
Ashish Tiwari, Carolyn L. Talcott
133
Voted
INFSOF
2002
153views more  INFSOF 2002»
15 years 2 months ago
Analyzing cloning evolution in the Linux kernel
Identifying code duplication in large multi-platform software systems is a challenging problem. This is due to a variety of reasons including the presence of high-level programmin...
Giuliano Antoniol, Umberto Villano, Ettore Merlo, ...
PSD
2010
Springer
109views Database» more  PSD 2010»
15 years 25 days ago
A Tool for Analyzing and Fixing Infeasible RCTA Instances
Minimum-distance controlled tabular adjustment methods (CTA), and its restricted variants (RCTA), is a recent perturbative approach for tabular data protection. Given a table to be...
Jordi Castro, José A. González
APLAS
2006
ACM
15 years 8 months ago
A Practical String Analyzer by the Widening Approach
The static determination of approximated values of string expressions has many potential applications. For instance, approximated string values may be used to check the validity an...
Tae-Hyoung Choi, Oukseh Lee, Hyunha Kim, Kyung-Goo...