Sciweavers

1548 search results - page 285 / 310
» Estimating Software Vulnerabilities
Sort
View
IPSN
2009
Springer
15 years 4 months ago
Monitoring heritage buildings with wireless sensor networks: The Torre Aquila deployment
Wireless sensor networks are untethered infrastructures that are easy to deploy and have limited visual impact—a key asset in monitoring heritage buildings of artistic interest....
Matteo Ceriotti, Luca Mottola, Gian Pietro Picco, ...
KBSE
2009
IEEE
15 years 4 months ago
Static Validation of C Preprocessor Macros
—The widely used C preprocessor (CPP) is generally considered a source of difficulty for understanding and maintaining C/C++ programs. The main reason for this difficulty is CP...
Andreas Saebjoernsen, Lingxiao Jiang, Daniel J. Qu...
ICFEM
2009
Springer
15 years 4 months ago
Approximate Model Checking of PCTL Involving Unbounded Path Properties
Abstract. We study the problem of applying statistical methods for approximate model checking of probabilistic systems against properties encoded as PCTL formulas. Such approximate...
Samik Basu, Arka P. Ghosh, Ru He
CW
2008
IEEE
15 years 4 months ago
Bi-Manual Interactive Tools for Cultural Heritage Researchers
The availability of intuitive, user-friendly and specialized software to work with 3D models of cultural heritage artifacts is as important as the availability of low-cost and rob...
Can Ozmen, Selim Balcisoy
ICSEA
2007
IEEE
15 years 3 months ago
A Model for the Effect of Caching on Algorithmic Efficiency in Radix based Sorting
— This paper demonstrates that the algorithmic performance of end user programs may be greatly affected by the two or three level caching scheme of the processor, and we introduc...
Arne Maus, Stein Gjessing