Sciweavers

1629 search results - page 302 / 326
» Infeasible Code Detection
Sort
View
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
14 years 2 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
MHCI
2004
Springer
14 years 2 months ago
A Prototype for Remote Vehicle Diagnostics
Abstract. The field of Remote Vehicle Diagnostics can be described as the remote management of vehicles equipped with electronic control systems. Despite the great potential that i...
Jonas Kuschel, Henrik Fagrell, Carl Johan Andersso...
SCVMA
2004
Springer
14 years 2 months ago
2D Motion Description and Contextual Motion Analysis: Issues and New Models
Abstract. In this paper, several important issues related to visual motion analysis are addressed with a focus on the type of motion information to be estimated and the way context...
Patrick Bouthemy
TLDI
2003
ACM
121views Formal Methods» more  TLDI 2003»
14 years 2 months ago
Types for atomicity
Ensuring the correctness of multithreaded programs is difficult, due to the potential for unexpected and nondeterministic interactions between threads. Previous work has addresse...
Cormac Flanagan, Shaz Qadeer
PTS
1993
106views Hardware» more  PTS 1993»
13 years 10 months ago
Generating Synchronizable Test Sequences Based on Finite State Machine with Distributed Ports
In the area of testing communication systems, the interfaces between systems to be tested and their testers have great impact on test generation and fault detectability. Several t...
Gang Luo, Rachida Dssouli, Gregor von Bochmann, Pa...