Sciweavers

1453 search results - page 243 / 291
» State and history in operating systems
Sort
View
131
Voted
SEKE
2010
Springer
14 years 11 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
ISCA
2005
IEEE
128views Hardware» more  ISCA 2005»
15 years 6 months ago
An Evaluation Framework and Instruction Set Architecture for Ion-Trap Based Quantum Micro-Architectures
: The theoretical study of quantum computation has yielded efficient algorithms for some traditionally hard problems. Correspondingly, experimental work on the underlying physical...
Steven Balensiefer, Lucas Kreger-Stickles, Mark Os...
HICSS
2012
IEEE
324views Biometrics» more  HICSS 2012»
13 years 8 months ago
Extending BPMN for Business Activity Monitoring
—Real-time access to key performance indicators is necessary to ensure timeliness and effectiveness of operational business processes. The concept of Business Activity Monitoring...
Jan-Philipp Friedenstab, Christian Janiesch, Marti...
136
Voted
SIGCOMM
2012
ACM
13 years 2 months ago
Picasso: flexible RF and spectrum slicing
This paper presents the design, implementation and evaluation of Picasso, a novel radio design that allows simultaneous transmission and reception on separate and arbitrary spectr...
Steven Siying Hong, Jeffrey Mehlman, Sachin Rajsek...
109
Voted
WSC
2000
15 years 1 months ago
Using simulation to evaluate cargo ship design on the LPD17 program
As part of the design of the next generation Naval Amphibious Transport Dock Ship (LPD17), simulation was used to evaluate the arrangement and flow of cargo on the ship and to int...
Joseph Hugan