Sciweavers

153 search results - page 30 / 31
» Fault origin adjudication
Sort
View
MOBICOM
1996
ACM
15 years 1 months ago
Building Reliable Mobile-Aware Applications Using the Rover Toolkit
This paper discusses extensions to the Rover toolkit for constructing reliable mobile-aware applications. The extensions improve upon the existing failure model, which only addres...
Anthony D. Joseph, M. Frans Kaashoek
AMOST
2007
ACM
15 years 1 months ago
Using LTL rewriting to improve the performance of model-checker based test-case generation
Model-checkers have recently been suggested for automated software test-case generation. Several works have presented methods that create efficient test-suites using model-checker...
Gordon Fraser, Franz Wotawa
ACMSE
2006
ACM
14 years 11 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
AAAI
1998
14 years 11 months ago
OKBC: A Programmatic Foundation for Knowledge Base Interoperability
The technology for building large knowledge bases (KBs) is yet to witness a breakthrough so that a KB can be constructed by the assembly of prefabricated knowledge components. Kno...
Vinay K. Chaudhri, Adam Farquhar, Richard Fikes, P...
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Correcting Errors in RSA Private Keys
Abstract. Let pk = (N , e) be an RSA public key with corresponding secret key sk = (p, q, d, dp, dq , q-1 p ). Assume that we obtain partial error-free information of sk, e.g., ass...
Wilko Henecka, Alexander May, Alexander Meurer