Sciweavers

20 search results - page 3 / 4
» Automatic Patch-Based Exploit Generation is Possible: Techni...
Sort
View
BMCBI
2008
119views more  BMCBI 2008»
13 years 9 months ago
On deducing causality in metabolic networks
Background: Metabolic networks present a complex interconnected structure, whose understanding is in general a non-trivial task. Several formal approaches have been developed to s...
Chiara Bodei, Andrea Bracciali, Davide Chiarugi
EVOW
2001
Springer
14 years 2 months ago
ARPIA: A High-Level Evolutionary Test Signal Generator
The integrated circuits design flow is rapidly moving towards higher description levels. However, test-related activities are lacking behind this trend, mainly since effective faul...
Fulvio Corno, Gianluca Cumani, Matteo Sonza Reorda...
CCS
2007
ACM
14 years 3 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
GECCO
2007
Springer
174views Optimization» more  GECCO 2007»
14 years 3 months ago
Investigating data-flow coverage of classes using evolutionary algorithms
It is not unusual for a software development organization to expend 40 percent of total project effort on testing, which can be a very laborious and time-consuming process. Thus, ...
Konstantinos Liaskos, Marc Roper, Murray Wood
ISCAS
2006
IEEE
106views Hardware» more  ISCAS 2006»
14 years 3 months ago
Integrating observability don't cares in all-solution SAT solvers
— All-solution Boolean satisfiability (SAT) solvers are engines employed to find all the possible solutions to a SAT problem. Their applications are found throughout the EDA in...
Sean Safarpour, Andreas G. Veneris, Rolf Drechsler