Sciweavers

10263 search results - page 1972 / 2053
» From Use Cases to System Operation Specifications
Sort
View
137
Voted
IPCCC
2006
IEEE
15 years 10 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
147
Voted
CCS
2009
ACM
15 years 8 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
132
Voted
STOC
2002
ACM
156views Algorithms» more  STOC 2002»
16 years 4 months ago
Selfish traffic allocation for server farms
We investigate the price of selfish routing in non-cooperative networks in terms of the coordination and bicriteria ratios in the recently introduced game theoretic network model ...
Artur Czumaj, Piotr Krysta, Berthold Vöcking
VLSID
2008
IEEE
191views VLSI» more  VLSID 2008»
15 years 11 months ago
Programming and Performance Modelling of Automotive ECU Networks
The last decade has seen a phenomenal increase in the use of electronic components in automotive systems, resulting in the replacement of purely mechanical or hydraulic-implementa...
Samarjit Chakraborty, Sethu Ramesh
VMCAI
2007
Springer
15 years 10 months ago
Better Under-Approximation of Programs by Hiding Variables
Abstraction frameworks use under-approximating transitions in order to prove existential properties of concrete systems. Under-approximating transifer to the concrete states that c...
Thomas Ball, Orna Kupferman
« Prev « First page 1972 / 2053 Last » Next »