Sciweavers

1548 search results - page 153 / 310
» Estimating Software Vulnerabilities
Sort
View
ISSTA
2009
ACM
15 years 6 months ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...
CASES
2005
ACM
15 years 1 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
CONEXT
2009
ACM
15 years 23 days ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
VLSID
2001
IEEE
184views VLSI» more  VLSID 2001»
16 years 1 days ago
Battery Life Estimation of Mobile Embedded Systems
Since battery life directly impacts the extent and duration of mobility, one of the key considerations in the design of a mobile embedded system should be to maximize the energy d...
Debashis Panigrahi, Sujit Dey, Ramesh R. Rao, Kani...
BMCBI
2010
109views more  BMCBI 2010»
14 years 11 months ago
Free energy estimation of short DNA duplex hybridizations
Background: Estimation of DNA duplex hybridization free energy is widely used for predicting cross-hybridizations in DNA computing and microarray experiments. A number of software...
Dan C. Tulpan, Mirela Andronescu, Serge Leger