Sciweavers

899 search results - page 81 / 180
» Cost Analysis of Games, Using Program Logic
Sort
View
COMCOM
2008
112views more  COMCOM 2008»
14 years 12 months ago
A game-theoretic analysis of wireless access point selection by mobile users
A user located in a congested area of a wireless LAN may benefit by moving to a less-crowded area and using a less-loaded access point. This idea has gained attention from research...
Kimaya Mittal, Elizabeth M. Belding, Subhash Suri
ACSAC
2007
IEEE
15 years 6 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
PLDI
2009
ACM
15 years 6 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
STOC
2002
ACM
156views Algorithms» more  STOC 2002»
16 years 4 days ago
Selfish traffic allocation for server farms
We investigate the price of selfish routing in non-cooperative networks in terms of the coordination and bicriteria ratios in the recently introduced game theoretic network model ...
Artur Czumaj, Piotr Krysta, Berthold Vöcking
SIGSOFT
2008
ACM
16 years 18 days ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren