Sciweavers

1781 search results - page 39 / 357
» Visualizing program execution using user abstractions
Sort
View
ICLP
2007
Springer
15 years 5 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
ACSAC
2008
IEEE
15 years 8 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
TACAS
2005
Springer
121views Algorithms» more  TACAS 2005»
15 years 7 months ago
FocusCheck: A Tool for Model Checking and Debugging Sequential C Programs
Abstract. We present the FocusCheck model-checking tool for the verification and easy debugging of assertion violations in sequential C programs. The main functionalities of the t...
Curtis W. Keller, Diptikalyan Saha, Samik Basu, Sc...
CGA
1999
15 years 1 months ago
Visualizing Large Telecommunication Data Sets
displays to abstract network data and let users interactwithit.Wehaveimplementedafull-scaleSwift3D prototype, which generated the examples we present here. Swift-3D We developed Sw...
Eleftherios Koutsofios, Stephen C. North, Daniel A...
IV
2000
IEEE
152views Visualization» more  IV 2000»
15 years 6 months ago
Effects of Desktop 3D World Design on User Navigation and Search Performance
Desktop virtual reality (VR) offers a powerful environment for visualizing structure in large information sets. In well-designed virtual worlds, users can employ skills from wayfi...
David Modjeska, John A. Waterworth