Sciweavers

2523 search results - page 485 / 505
» Correct Development of Embedded Systems
Sort
View
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
ATAL
2005
Springer
14 years 1 months ago
Experiences with the design and implementation of an agent-based autonomous UAV controller
This paper reports experiences and outcomes of designing and developing an agent–based, autonomous mission control system for an unmanned aerial vehicle (UAV). Most UAVs are not...
Samin Karim, Clinton Heinze
PLDI
2004
ACM
14 years 1 months ago
Jedd: a BDD-based relational extension of Java
In this paper we present Jedd, a language extension to Java that supports a convenient way of programming with Binary Decision Diagrams (BDDs). The Jedd language abstracts BDDs as...
Ondrej Lhoták, Laurie J. Hendren
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
14 years 29 days ago
Modeling Instrumental Conditioning - The Behavioral Regulation Approach
Basically, instrumental conditioning is learning through consequences: Behavior that produces positive results (high “instrumental response”) is reinforced, and that which pro...
Jose J. Gonzalez, Agata Sawicka
EUROSYS
2010
ACM
14 years 22 days ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero