Sciweavers

1974 search results - page 115 / 395
» Conditional Purchase Orders
Sort
View
IEEEARES
2010
IEEE
15 years 8 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
LOPSTR
1994
Springer
15 years 8 months ago
A Transformation System for Definite Programs Based on Termination Analysis
We present a goal replacement rule whose main applicability condition is based on termination properties of the resulting transformed program. The goal replacement rule together wi...
J. Cook, John P. Gallagher
ATVA
2006
Springer
131views Hardware» more  ATVA 2006»
15 years 8 months ago
Timed Unfoldings for Networks of Timed Automata
Whereas partial order methods have proved their efficiency for the analysis of discrete-event systems, their application to timed systems remains a challenging research topic. Here...
Patricia Bouyer, Serge Haddad, Pierre-Alain Reynie...
AIPS
1996
15 years 5 months ago
Least-Commitment Action Selection
The principle of least commitment was embraced early in planning research. Hierarchical task networks (HTNs)reason about high-level tasks without committing to specific low-level ...
Marc Friedman, Daniel S. Weld
CORR
2010
Springer
128views Education» more  CORR 2010»
15 years 4 months ago
Blind Compressed Sensing
The fundamental principle underlying compressed sensing is that a signal, which is sparse under some basis representation, can be recovered from a small number of linear measuremen...
Sivan Gleichman, Yonina C. Eldar