Sciweavers

314 search results - page 39 / 63
» The Complexity of Coverage
Sort
View
MOBIHOC
2004
ACM
16 years 1 months ago
On greedy geographic routing algorithms in sensing-covered networks
Greedy geographic routing is attractive in wireless sensor networks due to its efficiency and scalability. However, greedy geographic routing may incur long routing paths or even ...
Guoliang Xing, Chenyang Lu, Robert Pless, Qingfeng...
KBSE
2007
IEEE
15 years 8 months ago
Improving evolutionary class testing in the presence of non-public methods
Automating the generation of object-oriented unit tests is a challenging task. This is mainly due to the complexity and peculiarities that the principles of object-orientation imp...
Stefan Wappler, Ina Schieferdecker
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 8 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
136
Voted
SIGMOD
2004
ACM
124views Database» more  SIGMOD 2004»
15 years 7 months ago
An Interactive Clustering-based Approach to Integrating Source Query interfaces on the Deep Web
An increasing number of data sources now become available on the Web, but often their contents are only accessible through query interfaces. For a domain of interest, there often ...
Wensheng Wu, Clement T. Yu, AnHai Doan, Weiyi Meng
ITC
1998
IEEE
174views Hardware» more  ITC 1998»
15 years 6 months ago
High volume microprocessor test escapes, an analysis of defects our tests are missing
This paper explores defects found in a high volume microprocessor when shipping at a low defect level. A brief description of the manufacturing flow along with definition of DPM i...
Wayne M. Needham, Cheryl Prunty, Yeoh Eng Hong