Sciweavers

3482 search results - page 499 / 697
» In Praise of Numerical Computation
Sort
View
DSN
2008
IEEE
13 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
EDCC
2008
Springer
13 years 11 months ago
Metrics for Object-Oriented Software Reliability Assessment - Application to a Flight Manager
In avionics domain, the software applications grew to millions of source lines of code representing important development expenditures. To cut the costs, the avionics suppliers ar...
Stéphanie Gaudan, Gilles Motet, Guillaume A...
EMSOFT
2008
Springer
13 years 11 months ago
Symbolic analysis for improving simulation coverage of Simulink/Stateflow models
Aimed at verifying safety properties and improving simulation coverage for hybrid systems models of embedded control software, we propose a technique that combines numerical simul...
Rajeev Alur, Aditya Kanade, S. Ramesh, K. C. Shash...
DAGSTUHL
2007
13 years 10 months ago
From Algebraic Riccati equations to unilateral quadratic matrix equations: old and new algorithms
The problem of reducing an algebraic Riccati equation XCX − AX − XD + B = 0 to a unilateral quadratic matrix equation (UQME) of the kind PX2 + QX + R = 0 is analyzed. New redu...
Dario Andrea Bini, Beatrice Meini, Federico Poloni
ICMLA
2007
13 years 10 months ago
Scalable optimal linear representation for face and object recognition
Optimal Component Analysis (OCA) is a linear method for feature extraction and dimension reduction. It has been widely used in many applications such as face and object recognitio...
Yiming Wu, Xiuwen Liu, Washington Mio