Sciweavers

861 search results - page 152 / 173
» Symbolic Program Analysis Using Term Rewriting and Generaliz...
Sort
View
SIGDOC
2004
ACM
15 years 5 months ago
Liability for defective content
Software publishers and information service providers publish information about their own products and about other products and people. Additional content might be incidental, suc...
Cem Kaner
CCS
2003
ACM
15 years 5 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
DAC
2007
ACM
16 years 22 days ago
TROY: Track Router with Yield-driven Wire Planning
In this paper, we propose TROY, the first track router with yield-driven wire planning to optimize yield loss due to random defects. As the probability of failure (POF) computed f...
Minsik Cho, Hua Xiang, Ruchir Puri, David Z. Pan
SIGSOFT
2005
ACM
16 years 14 days ago
Fluent temporal logic for discrete-time event-based models
Fluent model checking is an automated technique for verifying that an event-based operational model satisfies some state-based declarative properties. The link between the event-b...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...
ICSE
2005
IEEE-ACM
15 years 11 months ago
A B.S. degree in informatics: contextualizing software engineering education
Software engineering (SE) is very different in focus from traditional computer science: it is not just about computers and software, but as much about the context in which they ar...
André van der Hoek, David G. Kay, Debra J. ...