Sciweavers

10910 search results - page 2033 / 2182
» Input modeling using a computer algebra system
Sort
View
SEKE
2010
Springer
14 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
ECIR
2011
Springer
14 years 1 months ago
Back to the Roots: Mean-Variance Analysis of Relevance Estimations
Recently, mean-variance analysis has been proposed as a novel paradigm to model document ranking in Information Retrieval. The main merit of this approach is that it diversifies t...
Guido Zuccon, Leif Azzopardi, Keith van Rijsbergen
DAC
2007
ACM
15 years 11 months ago
Energy-Aware Data Compression for Multi-Level Cell (MLC) Flash Memory
We discover significant value-dependent programming energy variations in multi-level cell (MLC) flash memories, and introduce an energy-aware data compression method that minimize...
Yongsoo Joo, Youngjin Cho, Donghwa Shin, Naehyuck ...
DAC
2002
ACM
15 years 11 months ago
Retargetable binary utilities
Since software is playing an increasingly important role in systemon-chip, retargetable compilation has been an active research area in the last few years. However, the retargetti...
Maghsoud Abbaspour, Jianwen Zhu
EWSN
2008
Springer
15 years 9 months ago
FiGaRo: Fine-Grained Software Reconfiguration for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are increasingly being proposed in scenarios whose requirements cannot be fully predicted, or where the system functionality must adapt to changing ...
Luca Mottola, Gian Pietro Picco, Adil Amjad Sheikh
« Prev « First page 2033 / 2182 Last » Next »