Sciweavers

7961 search results - page 1475 / 1593
» Input-Output Model Programs
Sort
View
SEKE
2010
Springer
15 years 1 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
SPIN
2010
Springer
15 years 1 months ago
Analysing Mu-Calculus Properties of Pushdown Systems
Pushdown systems provide a natural model of software with recursive procedure calls. We provide a tool implementing an algorithm for computing the winning regions of a pushdown par...
Matthew Hague, C.-H. Luke Ong
VLSI
2010
Springer
15 years 1 months ago
Fine-grained post placement voltage assignment considering level shifter overhead
—Multi-Vdd techniques enable application of lower supply voltage levels on cells with timing slacks. New voltage assignment, placement and voltage island partitioning methods are...
Zohreh Karimi, Majid Sarrafzadeh
ASPDAC
2010
ACM
163views Hardware» more  ASPDAC 2010»
15 years 1 months ago
A3MAP: architecture-aware analytic mapping for networks-on-chip
- In this paper, we propose a novel and global A3MAP (Architecture-Aware Analytic Mapping) algorithm applied to NoC (Networks-on-Chip) based MPSoC (Multi-Processor System-on-Chip) ...
Wooyoung Jang, David Z. Pan
GLOBECOM
2010
IEEE
15 years 1 months ago
Optimal Pricing for Mobile Video Streaming Using Behavior Analysis
Mobile phones are among the most popular consumer devices and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plan...
W. Sabrina Lin, K. J. Ray Liu
« Prev « First page 1475 / 1593 Last » Next »