Sciweavers

4307 search results - page 843 / 862
» Dynamic Spyware Analysis
Sort
View
HT
2007
ACM
14 years 16 days ago
Lesson learnt from a large-scale industrial semantic web application
The design and maintenance of an aero-engine generates a significant amount of documentation. When designing new engines, engineers must obtain knowledge gained from maintenance o...
Sylvia C. Wong, Richard M. Crowder, Gary B. Wills,...
AIPR
2004
IEEE
14 years 12 days ago
Feasibility Study for the Development of a Motion Imagery Quality Metric
The motion imagery community would benefit from the availability of standard measures for assessing image interpretability. The National Imagery Interpretability Rating Scale (NII...
John M. Irvine, Charles Fenimore, David M. Cannon,...
CIAC
2006
Springer
97views Algorithms» more  CIAC 2006»
14 years 11 days ago
Network Discovery and Verification with Distance Queries
The network discovery (verification) problem asks for a minimum subset Q V of queries in an undirected graph G = (V, E) such that these queries discover all edges and non-edges o...
Thomas Erlebach, Alexander Hall, Michael Hoffmann ...
FASE
2006
Springer
14 years 9 days ago
Trace-Based Memory Aliasing Across Program Versions
One of the major costs of software development is associated with testing and validation of successive versions of software systems. An important problem encountered in testing and...
Murali Krishna Ramanathan, Suresh Jagannathan, Ana...
FM
2006
Springer
146views Formal Methods» more  FM 2006»
14 years 9 days ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler