Sciweavers

4330 search results - page 786 / 866
» Analyzing security architectures
Sort
View
130
Voted
IFIP
2010
Springer
14 years 5 months ago
Model Checking of Concurrent Algorithms: From Java to C
Concurrent software is difficult to verify. Because the thread schedule is not controlled by the application, testing may miss defects that occur under specific thread schedules. T...
Cyrille Artho, Masami Hagiya, Watcharin Leungwatta...
103
Voted
TON
2010
115views more  TON 2010»
14 years 5 months ago
Design and Provisioning of WDM Networks With Many-to-Many Traffic Grooming
A large number of network applications today allow several users to interact together using the many-to-many service mode. In many-to-many communication, also referred to as group ...
M. A. Saleh, A. E. Kamal
ICASSP
2011
IEEE
14 years 2 months ago
Sub-Nyquist sampling of short pulses
—We develop sub-Nyquist sampling systems for analog signals comprised of several, possibly overlapping, finite duration pulses with unknown shapes and time positions. Efficient...
Ewa Matusiak, Yonina C. Eldar
87
Voted
ICASSP
2011
IEEE
14 years 2 months ago
Machine and acoustical condition dependency analyses for fast acoustic likelihood calculation techniques
The acceleration of acoustic likelihood calculation has been an important research issue for developing practical speech recognition systems. And there are various specification ...
Atsunori Ogawa, Satoshi Takahashi, Atsushi Nakamur...
101
Voted
ICST
2011
IEEE
14 years 2 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...