Sciweavers

2441 search results - page 377 / 489
» Engineering a Tool to Detect Automatically Generated Papers
Sort
View
DSN
2005
IEEE
15 years 9 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
ISCIS
2004
Springer
15 years 9 months ago
Software Testing via Model Checking
Testing is a necessary, but costly process for user-centric quality control. Moreover, testing is not comprehensive enough to completely detect faults. Many formal methods have bee...
Fevzi Belli, Baris Güldali
118
Voted
ICRA
1999
IEEE
117views Robotics» more  ICRA 1999»
15 years 8 months ago
Collision Control in Teleoperation by Virtual Force Reflection: An Application to the ROBTET System
: Well known collision avoiding approaches used in automatic robot path planning are also applied in teleoperation systems when moving in hazardous environments. In such cases, it ...
Miguel Hernando, Ernesto Gambao, E. Pinto, Antonio...
SIMUTOOLS
2008
15 years 5 months ago
Implementing MAC protocols for cooperative relaying: a compiler-assisted approach
Evaluating the performance of a cooperative relaying protocol requires an implementation for simulators and/or software-defined radios (SDRs) with an appropriate model for error d...
Hermann S. Lichte, Stefan Valentin
EUROSYS
2007
ACM
16 years 1 months ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...