Sciweavers

3104 search results - page 429 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
BCS
2008
15 years 6 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
160
Voted
SIGCOMM
2003
ACM
15 years 10 months ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...
TACAS
2010
Springer
181views Algorithms» more  TACAS 2010»
15 years 12 months ago
Boom: Taking Boolean Program Model Checking One Step Further
Abstract. We present Boom, a comprehensive analysis tool for Boolean programs. We focus in this paper on model-checking non-recursive concurrent programs. Boom implements a recent ...
Gérard Basler, Matthew Hague, Daniel Kroeni...
PTS
2008
109views Hardware» more  PTS 2008»
15 years 6 months ago
Runtime Verification of C Programs
We present in this paper a framework, RMOR, for monitoring the execution of C programs against state machines, expressed in a textual (nongraphical) format in files separate from t...
Klaus Havelund
CHI
2011
ACM
14 years 8 months ago
Evaluating the benefits of 3d stereo in modern video games
We present a study that investigates user performance benefits of 3D stereo in modern video games. Based on an analysis of several video games that are best suited for use with co...
Joseph J. LaViola Jr., Tad Litwiller