Sciweavers

238 search results - page 36 / 48
» Covering Codes for Hats-on-a-line
Sort
View
POPL
1994
ACM
15 years 1 months ago
Dominators, Super Blocks, and Program Coverage
In this paper we present techniques to nd subsets of nodes of a owgraph that satisfy the followingproperty: A test set that exercises all nodes in a subset exercises allnodes in t...
Hiralal Agrawal
ATAL
2006
Springer
15 years 1 months ago
Performance analysis of untraceability protocols for mobile agents using an adaptable framework
Recently we had proposed two untraceability protocols for mobile agents and began investigating their quality. We believe that quality evaluation of security protocols should exte...
Rafal Leszczyna, Janusz Górski
DSN
2004
IEEE
15 years 1 months ago
Dynamic Quarantine of Internet Worms
If we limit the contact rate of worm traffic, can we alleviate and ultimately contain Internet worms? This paper sets out to answer this question. Specifically, we are interested ...
Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Sta...
VAMOS
2010
Springer
14 years 11 months ago
Introducing TVL, a Text-based Feature Modelling
Feature models are a common way to represent variability in software product line engineering. For this purpose, most authors use a graphical notation based on FODA. The main drawb...
Quentin Boucher, Andreas Classen, Paul Faber, Patr...
66
Voted
LREC
2008
119views Education» more  LREC 2008»
14 years 11 months ago
Evaluation of Virtual Keyboards for West-African Languages
West African languages are written with alphabets that comprize non classical Latin characters. It is possible to design virtual keyboards which allow the writing of such special ...
Chantal Enguehard, Harouna Naroua