Sciweavers

1192 search results - page 68 / 239
» Symbolic Query Exploration
Sort
View
CAV
2005
Springer
104views Hardware» more  CAV 2005»
15 years 7 months ago
Expand, Enlarge and Check... Made Efficient
Abstract. The coverability problem is decidable for the class of wellstructured transition systems. Until recently, the only known algorithm to solve this problem was based on symb...
Gilles Geeraerts, Jean-François Raskin, Lau...
CCS
2010
ACM
15 years 2 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
121
Voted
ASPLOS
2012
ACM
13 years 9 months ago
Path-exploration lifting: hi-fi tests for lo-fi emulators
Processor emulators are widely used to provide isolation and instrumentation of binary software. However they have proved difficult to implement correctly: processor specificati...
Lorenzo Martignoni, Stephen McCamant, Pongsin Poos...
SAC
2005
ACM
15 years 7 months ago
A complex biological database querying method
Many biological information systems rely on relational database management systems (RDBMS) to manage high-throughput biological data. While keeping these data well archived, organ...
Jake Yue Chen, John V. Carlis, Ning Gao
PVLDB
2010
102views more  PVLDB 2010»
15 years 9 days ago
SQL QueRIE Recommendations
This demonstration presents QueRIE, a recommender system that supports interactive database exploration. This system aims at assisting non-expert users of scientific databases by...
Javad Akbarnejad, Gloria Chatzopoulou, Magdalini E...