Sciweavers

610 search results - page 84 / 122
» Generating Research Websites Using Summarisation Techniques
Sort
View
132
Voted
IMC
2010
ACM
15 years 1 months ago
Demystifying service discovery: implementing an internet-wide scanner
This paper develops a high-performance, Internet-wide service discovery tool, which we call IRLscanner, whose main design objectives have been to maximize politeness at remote net...
Derek Leonard, Dmitri Loguinov
AOSD
2005
ACM
15 years 9 months ago
abc: an extensible AspectJ compiler
Abstract. Research in the design of aspect-oriented programming languages requires a workbench that facilitates easy experimentation with new language features and implementation t...
Pavel Avgustinov, Aske Simon Christensen, Laurie J...
139
Voted
CAV
2011
Springer
253views Hardware» more  CAV 2011»
14 years 7 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
ISSTA
2004
ACM
15 years 9 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
122
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig