Sciweavers

2560 search results - page 448 / 512
» Analysis Tool for Honeypot Systems
Sort
View
ICSE
2005
IEEE-ACM
14 years 10 months ago
An empirical evaluation of test case filtering techniques based on exercising complex information flows
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
David Leon, Wes Masri, Andy Podgurski
AINA
2009
IEEE
14 years 4 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
HRI
2009
ACM
14 years 4 months ago
An information pipeline model of human-robot interaction
This paper investigates the potential usefulness of viewing the system of human, robot, and environment as an “information pipeline” from environment to user and back again. I...
Kevin Gold
TACAS
2009
Springer
131views Algorithms» more  TACAS 2009»
14 years 4 months ago
Verifying Reference Counting Implementations
Reference counting is a widely-used resource management idiom which maintains a count of references to each resource by incrementing the count upon an acquisition, and decrementing...
Michael Emmi, Ranjit Jhala, Eddie Kohler, Rupak Ma...
GLOBECOM
2009
IEEE
14 years 4 months ago
QOMB: A Wireless Network Emulation Testbed
—In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless ne...
Razvan Beuran, Lan Tien Nguyen, Toshiyuki Miyachi,...