Sciweavers

981 search results - page 183 / 197
» Symbolic pointer analysis
Sort
View
VTC
2010
IEEE
145views Communications» more  VTC 2010»
14 years 10 months ago
Performance of Multihop Wireless Links over Generalized-K Fading Channels
— The performance of multihop links is studied in this contribution by both analysis and simulations, when communicating over Generalized-K (KG) fading channels. The performance ...
Jianfei Cao, Lie-Liang Yang, Zhangdui Zhong
ENASE
2009
179views Hardware» more  ENASE 2009»
14 years 10 months ago
Evolving System's Modeling and Simulation through Reflective Petri Nets
Abstract. The design of dynamic discrete-event systems calls for adequate modeling formalisms and tools to manage possible changes occurring during system's lifecycle. A commo...
Lorenzo Capra, Walter Cazzola
118
Voted
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 10 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
ICST
2009
IEEE
14 years 10 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
CG
2011
Springer
14 years 7 months ago
Multiresolutions numerically from subdivisions
In previous work we introduced a construction to produce multiresolutions from given subdivisions. A portion of that construction required solving bilinear equations using a symbo...
Richard H. Bartels, Faramarz Samavati