Sciweavers

340 search results - page 18 / 68
» Automated error analysis for the agilization of feature mode...
Sort
View
MASCOTS
2008
13 years 10 months ago
Evaluating the Effectiveness of Information Extraction in Real-World Storage Management
As storage deployments within enterprises continue to grow, there is an increasing need to simplify and automate. Existing tools for automation rely on extracting information in t...
Aameek Singh, Sandeep Uttamchandani, Yin Wang
ICRA
2009
IEEE
125views Robotics» more  ICRA 2009»
13 years 6 months ago
Mapping opaque and confined environments using proprioception
Mapping opaque and confined environments such as caves and pipes is a challenging problem for mobile robots because sensor information is severely limited to the immediate proximit...
Jacob Everist, Wei-Min Shen
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 28 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
EUROMICRO
2007
IEEE
13 years 10 months ago
Analysis of BPEL Data Dependencies
BPEL is a de-facto standard language for web service orchestration. It is a challenge to test BPEL processes automatically because of the complex features of the language. The cur...
Yongyan Zheng, Jiong Zhou, Paul Krause
DAC
2003
ACM
14 years 9 months ago
Accurate timing analysis by modeling caches, speculation and their interaction
Schedulability analysis of real-time embedded systems requires worst case timing guarantees of embedded software performance. This involves not only language level program analysi...
Xianfeng Li, Tulika Mitra, Abhik Roychoudhury