Sciweavers

4079 search results - page 784 / 816
» Differential Testing for Software
Sort
View
ICFEM
2007
Springer
14 years 2 months ago
Model Checking with SAT-Based Characterization of ACTL Formulas
Bounded semantics of LTL with existential interpretation and that of ECTL (the existential fragment of CTL), and the characterization of these existentially interpreted properties ...
Wenhui Zhang
ICMI
2007
Springer
121views Biometrics» more  ICMI 2007»
14 years 2 months ago
A tactile language for intuitive human-robot communication
Abstract— This paper presents a tactile language for controlling a robot through its artificial skin. This language greatly improves the multimodal human-robot communication by ...
Andreas J. Schmid, Martin Hoffmann, Heinz Wör...
IPSN
2007
Springer
14 years 2 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
ISW
2007
Springer
14 years 2 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
ACSAC
2006
IEEE
14 years 2 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh