Sciweavers

7991 search results - page 1568 / 1599
» Using More Reasoning to Improve
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
NPIV
1998
ACM
108views Visualization» more  NPIV 1998»
15 years 2 months ago
Visualization for situation awareness
We explore techniques from visualization and computational geometry to make tactical information more intuitive to a military commander. To be successful, the commander must quick...
C. M. Hoffman, Y.-J. Kim, R. P. Winkler, J. D. Wal...
ICC
1997
IEEE
159views Communications» more  ICC 1997»
15 years 2 months ago
Adaptive Coded Modulation for Fading Channels
— We apply coset codes to adaptive modulation in fading channels. Adaptive modulation is a powerful technique to improve the energy efficiency and increase the data rate over a ...
Soon-Ghee Chua, Andrea J. Goldsmith
ICCAD
1997
IEEE
86views Hardware» more  ICCAD 1997»
15 years 2 months ago
Interconnect design for deep submicron ICs
Interconnect has become the dominating factor in determining circuit performance and reliability in deep submicron designs. In this embedded tutorial, we first discuss the trends...
Jason Cong, David Zhigang Pan, Lei He, Cheng-Kok K...
VLDB
1998
ACM
110views Database» more  VLDB 1998»
15 years 2 months ago
Massive Stochastic Testing of SQL
Deterministic testing of SQL database systems is human intensive and cannot adequately cover the SQL input domain. A system (RAGS), was built to stochastically generate valid SQL ...
Donald R. Slutz
« Prev « First page 1568 / 1599 Last » Next »