Sciweavers

2797 search results - page 380 / 560
» Code query by example
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
—In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM...
Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao
ICSM
2007
IEEE
15 years 10 months ago
Design recovery and maintenance of build systems
The build system forms an indispensable part of any software project. It needs to evolve in parallel with the source code in order to build, test and install the software. Unfortu...
Bram Adams, Herman Tromp, Kris De Schutter, Wolfga...
119
Voted
CAV
2007
Springer
121views Hardware» more  CAV 2007»
15 years 10 months ago
Algorithms for Interface Synthesis
Abstract. A temporal interface for a software component is a finite automaton that specifies the legal sequences of calls to functions that are provided by the component. We comp...
Dirk Beyer, Thomas A. Henzinger, Vasu Singh
131
Voted
IDEAS
2006
IEEE
110views Database» more  IDEAS 2006»
15 years 9 months ago
Towards Traceability across Sovereign, Distributed RFID Databases
Tracking and tracing individual items is a new and emerging trend in many industries. Driven by maturing technologies such as Radio-Frequency Identification (RFID) and upcoming s...
Rakesh Agrawal, Alvin Cheung, Karin Kailing, Stefa...
166
Voted
SMI
2006
IEEE
186views Image Analysis» more  SMI 2006»
15 years 9 months ago
BSP Shapes
We discuss a shape representation based on a set of disconnected (planar) polygons. The polygons are computed by creating a BSP that contains approximately linear surface patches ...
Carsten Stoll, Hans-Peter Seidel, Marc Alexa