Sciweavers

1492 search results - page 277 / 299
» Testing Properties of Constraint-Graphs
Sort
View
VMCAI
2007
Springer
15 years 5 months ago
Better Under-Approximation of Programs by Hiding Variables
Abstraction frameworks use under-approximating transitions in order to prove existential properties of concrete systems. Under-approximating transifer to the concrete states that c...
Thomas Ball, Orna Kupferman
ICPP
2006
IEEE
15 years 5 months ago
Parallel Algorithms for Evaluating Centrality Indices in Real-world Networks
This paper discusses fast parallel algorithms for evaluating several centrality indices frequently used in complex network analysis. These algorithms have been optimized to exploi...
David A. Bader, Kamesh Madduri
RTAS
2006
IEEE
15 years 5 months ago
Scalable Modeling and Performance Evaluation of Wireless Sensor Networks
A notable features of many proposed Wireless Sensor Networks (WSNs) deployments is their scale: hundreds to thousands of nodes linked together. In such systems, modeling the state...
YoungMin Kwon, Gul Agha
SMI
2006
IEEE
123views Image Analysis» more  SMI 2006»
15 years 5 months ago
Selecting Distinctive 3D Shape Descriptors for Similarity Retrieval
Databases of 3D shapes have become widespread for a variety of applications, and a key research problem is searching these databases for similar shapes. This paper introduces a me...
Philip Shilane, Thomas A. Funkhouser
ASPLOS
2006
ACM
15 years 5 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...