Sciweavers

55 search results - page 11 / 11
» A Mechanical Analysis of Program Verification Strategies
Sort
View
EMO
2006
Springer
219views Optimization» more  EMO 2006»
14 years 2 months ago
ParadisEO-MOEO: A Framework for Evolutionary Multi-objective Optimization
Abstract. This paper presents ParadisEO-MOEO, a white-box objectoriented generic framework dedicated to the flexible design of evolutionary multi-objective algorithms. This paradig...
Arnaud Liefooghe, Matthieu Basseur, Laetitia Jourd...
NDSS
2009
IEEE
14 years 5 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
SAC
2009
ACM
14 years 5 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
VR
1999
IEEE
152views Virtual Reality» more  VR 1999»
14 years 3 months ago
An Operator Interface for a Robot-Mounted, 3D Camera System: Project Pioneer
The purpose of Project Pioneer is to develop an exploratory robot capable of creating a three-dimensional photo-realistic map of the inside of the damaged Chornobyl Nuclear Reacto...
Fitzgerald Steele Jr., Geb W. Thomas, Theodore Bla...
RTSS
2003
IEEE
14 years 4 months ago
Data Caches in Multitasking Hard Real-Time Systems
Data caches are essential in modern processors, bridging the widening gap between main memory and processor speeds. However, they yield very complex performance models, which make...
Xavier Vera, Björn Lisper, Jingling Xue