Sciweavers

1562 search results - page 18 / 313
» A case study in testing a network security algorithm
Sort
View
120
Voted
WISEC
2009
ACM
15 years 9 months ago
Towards a theory for securing time synchronization in wireless sensor networks
Time synchronization in highly distributed wireless systems like sensor and ad hoc networks is extremely important in order to maintain a consistent notion of time throughout the ...
Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, ...
97
Voted
ISSTA
2000
ACM
15 years 6 months ago
Simplifying failure-inducing input
Given some test case, a program fails. Which part of the test case is responsible for the particular failure? We show how our delta debugging algorithm generalizes and simplifies...
Ralf Hildebrandt, Andreas Zeller
ACSAC
2005
IEEE
15 years 8 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
131
Voted
KES
2007
Springer
15 years 8 months ago
Multiple Ant Colony Optimization for a Rich Vehicle Routing Problem: A Case Study
Rich vehicle routing problems try to represent situations that can be found in reality. Starting from a case study, in this paper a rich vehicle routing problem is analyzed. The e...
Paola Pellegrini, Daniela Favaretto, Elena Moretti
ISMIR
2004
Springer
126views Music» more  ISMIR 2004»
15 years 7 months ago
Tools and Architecture for the Evaluation of Similarity Measures : Case Study of Timbre Similarity
The systematic testing of the very many parameters and algorithmic variants involved in the design of high-level music descriptors at large, and similarity measure in particular, ...
Jean-Julien Aucouturier, François Pachet