Sciweavers

581 search results - page 19 / 117
» In case you missed it
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
14 years 1 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...
APN
2006
Springer
14 years 1 months ago
Can I Execute My Scenario in Your Net? VipTool Tells You!
This paper describes the verification module (the VipVerify Module) of the VipTool [4]. VipVerify allows to verify whether a given scenario is an execution of a system model, given...
Robin Bergenthum, Jörg Desel, Gabriel Juh&aac...
LREC
2008
118views Education» more  LREC 2008»
13 years 11 months ago
What would you Ask a conversational Agent? Observations of Human-Agent Dialogues in a Museum Setting
Embodied Conversational Agents have typically been constructed for use in limited domain applications, and tested in very specialized environments. Only in recent years have there...
Susan Robinson, David R. Traum, Midhun Ittycheriah...
GRID
2008
Springer
13 years 11 months ago
Which network measurement tool is right for you? a multidimensional comparison study
Network performance measurement and prediction is one of the most prominent and indispensable components in distributed computing environments. The selection of the most advantage...
Esma Yildirim, Ibrahim H. Suslu, Tevfik Kosar
ACMSE
2009
ACM
14 years 4 months ago
A case for compiler-driven superpage allocation
Most modern microprocessor-based systems provide support for superpages both at the hardware and software level. Judicious use of superpages can significantly cut down the number...
Joshua Magee, Apan Qasem