Sciweavers

899 search results - page 81 / 180
» Cost Analysis of Games, Using Program Logic
Sort
View
COMCOM
2008
112views more  COMCOM 2008»
15 years 1 months ago
A game-theoretic analysis of wireless access point selection by mobile users
A user located in a congested area of a wireless LAN may benefit by moving to a less-crowded area and using a less-loaded access point. This idea has gained attention from research...
Kimaya Mittal, Elizabeth M. Belding, Subhash Suri
151
Voted
ACSAC
2007
IEEE
15 years 8 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
PLDI
2009
ACM
15 years 8 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
STOC
2002
ACM
156views Algorithms» more  STOC 2002»
16 years 1 months ago
Selfish traffic allocation for server farms
We investigate the price of selfish routing in non-cooperative networks in terms of the coordination and bicriteria ratios in the recently introduced game theoretic network model ...
Artur Czumaj, Piotr Krysta, Berthold Vöcking
SIGSOFT
2008
ACM
16 years 2 months ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren