Sciweavers

1362 search results - page 114 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
164
Voted
FECS
2006
529views Education» more  FECS 2006»
15 years 5 months ago
Student Projects in Computer Networking: Simulation versus Coding
In this paper, we discuss the advantages and disadvantages of using network simulators to teach networking concepts versus having students write programs. The authors have experie...
Leann Christianson, Kevin Q. Brown
163
Voted
DAC
2004
ACM
16 years 4 months ago
A SAT-based algorithm for reparameterization in symbolic simulation
Parametric representations used for symbolic simulation of circuits usually use BDDs. After a few steps of symbolic simulation, state set representation is converted from one para...
Pankaj Chauhan, Edmund M. Clarke, Daniel Kroening
130
Voted
SIGCOMM
2006
ACM
15 years 9 months ago
Building an AS-topology model that captures route diversity
An understanding of the topological structure of the Internet is needed for quite a number of networking tasks, e.g., making decisions about peering relationships, choice of upstr...
Wolfgang Mühlbauer, Anja Feldmann, Olaf Maenn...
116
Voted
IJON
2006
91views more  IJON 2006»
15 years 3 months ago
Symmetry axis extraction by a neural network
This paper proposes a neural network model that extracts axes of symmetry from visual patterns. The input patterns can be line drawings, plane figures or gray-scaled natural image...
Kunihiko Fukushima, Masayuki Kikuchi
121
Voted
NDSS
2007
IEEE
15 years 10 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...