Sciweavers

6740 search results - page 1157 / 1348
» Using Classification as a Programming Language
Sort
View
COMPSAC
2008
IEEE
15 years 11 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
SEMCO
2007
IEEE
15 years 11 months ago
Evolutionary Conceptual Clustering of Semantically Annotated Resources
A clustering method is presented which can be applied to knowledge bases storing semantically annotated resources. The method can be used to discover groupings of structured objec...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
TASE
2007
IEEE
15 years 11 months ago
Symmetry Reduced Model Checking for B
Symmetry reduction is a technique that can help alleviate the problem of state space explosion in model checking. The idea is to verify only a subset of states from each class (or...
Edd Turner, Michael Leuschel, Corinna Spermann, Mi...
IFIP
2007
Springer
15 years 11 months ago
Towards a Context Binding Transparency
Context-aware applications use context information, like location or identification of nearby objects of interest, to adapt their behavior to the current situation of the user. The...
Tom Broens, Dick A. C. Quartel, Marten van Sindere...
LCTRTS
2007
Springer
15 years 11 months ago
Hierarchical real-time garbage collection
Memory management is a critical issue for correctness and performance in real-time embedded systems. Recent work on real-time garbage collectors has shown that it is possible to p...
Filip Pizlo, Antony L. Hosking, Jan Vitek
« Prev « First page 1157 / 1348 Last » Next »