Sciweavers

2132 search results - page 382 / 427
» Automated software winnowing
Sort
View
114
Voted
WORM
2004
15 years 5 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
SFP
2003
15 years 5 months ago
Testing reactive systems with GAST
G∀ST is a fully automatic test system. Given a logical property, stated as a function, it is able to generate appropriate test values, to execute tests with these values, and to ...
Pieter W. M. Koopman, Rinus Plasmeijer
FTCS
1998
79views more  FTCS 1998»
15 years 5 months ago
Proving Correctness of a Controller Algorithm for the RAID Level 5 System
Most RAID controllers implemented in industry are complicated and di cult to reason about. This complexity has led to software and hardware systems that are di cult to debug and h...
Mandana Vaziri, Nancy A. Lynch, Jeannette M. Wing
KIC
2000
15 years 5 months ago
On Engineering Design Generation with XML-based Knowledge-Enhanced Grammars
One of the major bottlenecks in conceptual engineering design is the pure amount of design information which the design engineer needs to take into consideration. Furthermore, the ...
S. Rudolph, Hansrudi Noser
102
Voted
WCE
2007
15 years 5 months ago
Constrained Path Optimisation for Underground Mine Layout
Abstract—The major infrastructure component required to develop an underground mine is a decline, which is a system of tunnels used for access and haulage. In this paper we study...
Marcus Brazil, P. A. Grossman, D. H. Lee, J. H. Ru...