Sciweavers

562 search results - page 48 / 113
» Attack graph generation and analysis
Sort
View
SIGMOD
2008
ACM
150views Database» more  SIGMOD 2008»
14 years 7 months ago
LearnPADS: automatic tool generation from ad hoc data
In this demonstration, we will present LEARNPADS, a fully automatic system for generating ad hoc data processing tools. When presented with a collection of ad hoc data, the system...
Kathleen Fisher, David Walker, Kenny Qili Zhu
ADHOC
2007
137views more  ADHOC 2007»
13 years 7 months ago
"MeshUp": Self-organizing mesh-based topologies for next generation radio access networks
The phenomenal growth in wireless technologies has brought about a slew of new services. Incumbent with the new technology is the challenge of providing flexible, reconfigurable...
Samik Ghosh, Kalyan Basu, Sajal K. Das
ICST
2009
IEEE
14 years 2 months ago
Test Input Generation Using UML Sequence and State Machines Models
We propose a novel testing approach that combines information from UML sequence models and state machine models. Current approaches that rely solely on sequence models do not cons...
Aritra Bandyopadhyay, Sudipto Ghosh
CORR
2007
Springer
154views Education» more  CORR 2007»
13 years 7 months ago
Application of a design space exploration tool to enhance interleaver generation
This paper presents a methodology to efficiently explore the design space of communication adapters. In most digital signal processing (DSP) applications, the overall performance ...
Cyrille Chavet, Philippe Coussy, Pascal Urard, Eri...
DCOSS
2006
Springer
13 years 11 months ago
COTA: A Robust Multi-hop Localization Scheme in Wireless Sensor Networks
In wireless sensor networks, multi-hop localization schemes are very vulnerable to various attacks such as wormholes and range modification attacks. In this paper, we propose a rob...
Yawen Wei, Zhen Yu, Yong Guan