Sciweavers

1848 search results - page 195 / 370
» A Question Answering System for the Operation of Software Ap...
Sort
View
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
14 years 1 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
SECON
2007
IEEE
14 years 3 months ago
A SoC-based Sensor Node: Evaluation of RETOS-enabled CC2430
—Recent progress in Wireless Sensor Networks technology has enabled many complicated real-world applications. Some of the applications demand a non-trivial amount of computation;...
Sukwon Choi, Hojung Cha, SungChil Cho
MOBIDE
1999
ACM
14 years 1 months ago
Data Warehousing Alternatives for Mobile Environments
With rapid advancement in technology, mobile devices are increasingly becoming the norm. These devices are characterized by their need to operate even when they are disconnected f...
Ioana Stanoi, Divyakant Agrawal, Amr El Abbadi, Sh...
ICSM
1997
IEEE
14 years 1 months ago
Reverse Architecting Approach for Complex Systems
Philips is an electronics company which operates world wide and participates in professional as well as consumer markets. The architecture of many software intensive systems are c...
René L. Krikhaar
EMSOFT
2006
Springer
14 years 1 months ago
Implementing fault-tolerance in real-time systems by automatic program transformations
We present a formal approach to implement and certify fault-tolerance in real-time embedded systems. The faultintolerant initial system consists of a set of independent periodic t...
Tolga Ayav, Pascal Fradet, Alain Girault