Sciweavers

1702 search results - page 224 / 341
» Doomed program points
Sort
View
DI
2007
81views more  DI 2007»
15 years 4 months ago
Using every part of the buffalo in Windows memory analysis
All Windows memory analysis techniques depend on the examiner’s ability to translate the virtual addresses used by programs and operating system components into the true locatio...
Jesse D. Kornblum
JUCS
2008
132views more  JUCS 2008»
15 years 4 months ago
Trading Links and Paths on a Communication Bandwidth Market
: This paper presents a novel market model for balancing communication bandwidth trade. The distinguishing characteristic of the model is that it assumes that market players can pl...
Wojciech Stanczuk, Józef Lubacz, Eugeniusz ...
ORL
2008
111views more  ORL 2008»
15 years 4 months ago
Certificates of linear mixed integer infeasibility
A central result in the theory of integer optimization states that a system of linear diophantine equations Ax = b has no integral solution if and only if there exists a vector in...
Kent Andersen, Quentin Louveaux, Robert Weismantel
137
Voted
TASE
2008
IEEE
15 years 4 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
JIPS
2007
88views more  JIPS 2007»
15 years 4 months ago
Interface Development for the Point-of-care device based on SOPC
: This paper describes the development of the sensor interface and driver program for a point of care (POC) device. The proposed POC device comprises an ARM9 embedded processor and...
Hong Bum Son, Sung Gun Song, Jae Wook Jung, Chang ...