Sciweavers

2441 search results - page 80 / 489
» Engineering a Tool to Detect Automatically Generated Papers
Sort
View
COMPSAC
2009
IEEE
15 years 3 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
90
Voted
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 2 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
IOLTS
2005
IEEE
206views Hardware» more  IOLTS 2005»
15 years 4 months ago
A Hamming Distance Based Test Pattern Generator with Improved Fault Coverage
This paper proposes a new test pattern generator (TPG) which is an enhancement of GLFSR (Galois LFSR). This design is based on certain non–binary error detecting codes, formulat...
Dhiraj K. Pradhan, Dimitri Kagaris, Rohit Gambhir
LCTRTS
2010
Springer
15 years 5 months ago
Design exploration and automatic generation of MPSoC platform TLMs from Kahn Process Network applications
With increasingly more complex Multi-Processor Systems on Chip (MPSoC) and shortening time-to- market projections, Transaction Level Modeling and Platform Aware Design are seen as...
Ines Viskic, Lochi Lo Chi Yu Lo, Daniel Gajski
RE
2004
Springer
15 years 4 months ago
RETNA: From Requirements to Testing in a Natural Way
Most problems in building and refining a system can be traced back to errors in requirements. Poorly organized requirements, most often in natural language are among the major ca...
Ravishankar Boddu, Lan Guo, Supratik Mukhopadhyay,...