Sciweavers

933 search results - page 17 / 187
» Extending Forward Checking
Sort
View
KBSE
2009
IEEE
14 years 3 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
ICASSP
2011
IEEE
13 years 5 days ago
Beamforming design for multi-user two-way relaying with MIMO amplify and forward relays
Relays represent a promising approach to extend the cell coverage, combat the strong shadowing effects as well as guarantee the QoS in dense networks. Among the numerous existing ...
Jianshu Zhang, Florian Roemer, Martin Haardt
WINET
2008
77views more  WINET 2008»
13 years 8 months ago
VE-mobicast: a variant-egg-based mobicast routing protocol for sensornets
In this paper, we present a new "spatiotemporal multicast", called a "mobicast", protocol for supporting applications which require spatiotemporal coordination...
Yuh-Shyan Chen, Shin-Yi Ann, Yun-Wei Lin
ECAI
2008
Springer
13 years 10 months ago
Learning in Planning with Temporally Extended Goals and Uncontrollable Events
Recent contributions to advancing planning from the classical model to more realistic problems include using temporal logic such as LTL to express desired properties of a solution ...
André A. Ciré, Adi Botea
ENTCS
2007
99views more  ENTCS 2007»
13 years 8 months ago
Extending Symmetry Reduction Techniques to a Realistic Model of Computation
Much of the literature on symmetry reductions for model checking assumes a simple model of computation where the local state of each component in a concurrent system can be repres...
Alastair F. Donaldson, Alice Miller