Sciweavers

1275 search results - page 4 / 255
» Are you having difficulty
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
13 years 11 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...
WSC
1998
13 years 8 months ago
So You Have Your Model: What to Do Next. A Tutorial on Simulation Output Analysis
Simulation models are built with the intent of studying the behavior of the real system represented by the model. However, a simulation model generates random outputs; thus, the d...
Martha A. Centeno, M. Florencia Reyes
BEHAVIOURIT
2006
96views more  BEHAVIOURIT 2006»
13 years 7 months ago
Attention web designers: You have 50 milliseconds to make a good first impression!
Gitte Lindgaard, Gary Fernandes, Cathy Dudek, J. B...
SENSYS
2010
ACM
13 years 5 months ago
If you have time, save energy with pull
David Hasenfratz, Andreas Meier, Matthias Woehrle,...