Sciweavers

1239 search results - page 72 / 248
» Control Generation for Logic Programs
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
RSCTC
2000
Springer
122views Fuzzy Logic» more  RSCTC 2000»
13 years 11 months ago
Computer Vision Using Fuzzy Logic for Robot Manipulator
: This paper presents a Lab. implementation of a computer vision using fuzzy models for pattern recognition for the detection of boundaries in images obtained through a camera inst...
Adriano Breunig, Haroldo R. de Azevedo, Edilberto ...
FROCOS
2005
Springer
14 years 1 months ago
Logical Analysis of Hash Functions
Abstract. In this paper we report on a novel approach for uniform encoding of hash functions (but also other cryptographic functions) into propositional logic formulae, and reducin...
Dejan Jovanovic, Predrag Janicic
CDC
2009
IEEE
143views Control Systems» more  CDC 2009»
13 years 11 months ago
Management of electric vehicle charging to mitigate renewable generation intermittency and distribution network congestion
—We consider the management of electric vehicle (EV) loads within a market-based Electric Power System Control Area. EV load management achieves cost savings in both (i) EV batte...
Michael C. Caramanis, Justin M. Foster
ACSC
2005
IEEE
14 years 1 months ago
Integration of generic program analysis tools into a software development environment
Support for program understanding in development and maintenance tasks can be facilitated by program analysis techniques. Both control-flow and data-flow analysis can support pr...
Erica Glynn, Ian J. Hayes, Anthony MacDonald