Sciweavers

809 search results - page 151 / 162
» Requirements by Contracts allow Automated System Testing
Sort
View
DAC
2005
ACM
16 years 19 days ago
Energy optimal speed control of devices with discrete speed sets
We obtain analytically, the energy optimal speed profile of a generic multi-speed device with a discrete set of speeds, to execute a given task within a given time. Current implem...
Ravishankar Rao, Sarma B. K. Vrudhula
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 3 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
VRML
2004
ACM
15 years 5 months ago
A VRML97-X3D extension for massive scenery management in virtual worlds
In this paper we present a VRML97-X3D extension to describe precomputed visibility relationships in the context of progressive transmission as well as real time visualization of m...
Jean-Eudes Marvie, Kadi Bouatouch
APSEC
2005
IEEE
15 years 1 months ago
Improving Agile Software Development using eXtreme AOCE and Aspect-Oriented CVS
Currently there are no Concurrent Versioning Systems (CVS) designed to properly support agile software development. The existing CVS lacks user friendliness and it requires users ...
Santokh Singh, Hsiao-Cheng Chen, Oliver Hunter, Jo...
SIGSOFT
2003
ACM
16 years 12 days ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler