Sciweavers

page 59999 / 60054
» publications
Sort
View
SIGGRAPH
1990
ACM
15 years 2 months ago
Rapid controlled movement through a virtual 3D workspace
not abstract asymmetry: different sides looks different clumps different from "data objects" need grid structure, alignment [Design Guidelines for Landmarks to Support Na...
Jock D. Mackinlay, Stuart K. Card, George G. Rober...
CSE
2009
IEEE
15 years 1 months ago
Equilibria and Efficiency Loss in Games on Networks
Social networks are the substrate upon which we make and evaluate many of our daily decisions: our costs and benefits depend on whether--or how many of, or which of--our friends ar...
Joshua R. Davis, Zachary Goldman, Jacob Hilty, Eli...
PODC
2010
ACM
15 years 1 months ago
The multiplicative power of consensus numbers
: The Borowsky-Gafni (BG) simulation algorithm is a powerful reduction algorithm that shows that t-resilience of decision tasks can be fully characterized in terms of wait-freedom....
Damien Imbs, Michel Raynal
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 1 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
CAV
2010
Springer
282views Hardware» more  CAV 2010»
15 years 1 months ago
A NuSMV Extension for Graded-CTL Model Checking
Graded-CTL is an extension of CTL with graded quantifiers which allow to reason about either at least or all but any number of possible futures. In this paper we show an extension...
Alessandro Ferrante, Maurizio Memoli, Margherita N...
« Prev « First page 59999 / 60054 Last » Next »