Sciweavers

1258 search results - page 157 / 252
» Table design in dynamic programming
Sort
View
ACSAC
2008
IEEE
15 years 10 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
LCTRTS
2005
Springer
15 years 9 months ago
Syncopation: generational real-time garbage collection in the metronome
Real-time garbage collection has been shown to be feasible, but for programs with high allocation rates, the utilization achievable is not sufficient for some systems. Since a hi...
David F. Bacon, Perry Cheng, David Grove, Martin T...
CONCURRENCY
1998
139views more  CONCURRENCY 1998»
15 years 3 months ago
Applications experience in Jade
This paper presents our experience developing applications in Jade, a portable, implicitly parallel programming language designed for exploiting task-level concurrency. Jade progr...
Martin C. Rinard
132
Voted
ICRA
2009
IEEE
176views Robotics» more  ICRA 2009»
15 years 10 months ago
Rollin' Justin - Mobile platform with variable base
Abstract— Research on humanoid robots for use in servicing tasks, e.g. fetching and delivery, attracts steadily more interest. With ”Rollin’ Justin” a mobile robotic system...
Christoph Borst, Thomas Wimböck, Florian Schm...
110
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Lightweight object specification with typestates
Previous work has proven typestates to be useful for modeling protocols in object-oriented languages. We build on this work by addressing substitutability of subtypes as well as i...
Kevin Bierhoff, Jonathan Aldrich