Sciweavers

26 search results - page 4 / 6
» Isolating failure causes through test case generation
Sort
View
COMPSAC
2009
IEEE
13 years 11 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
SENSYS
2005
ACM
14 years 1 months ago
Sympathy for the sensor network debugger
Being embedded in the physical world, sensor networks present a wide range of bugs and misbehavior qualitatively different from those in most distributed systems. Unfortunately, d...
Nithya Ramanathan, Kevin K. Chang, Rahul Kapur, Le...
GLVLSI
2005
IEEE
99views VLSI» more  GLVLSI 2005»
14 years 1 months ago
An empirical study of crosstalk in VDSM technologies
We perform a detailed study of various crosstalk scenarios in VDSM technologies by using a distributed model of the crosstalk site and make a number of key observations about the ...
Shahin Nazarian, Massoud Pedram, Emre Tuncer
HIS
2007
13 years 9 months ago
Genetic Programming meets Model-Driven Development
Genetic programming is known to provide good solutions for many problems like the evolution of network protocols and distributed algorithms. In such cases it is most likely a hard...
Thomas Weise, Michael Zapf, Mohammad Ullah Khan, K...
INFOCOM
2009
IEEE
14 years 2 months ago
Topology Formation for Wireless Mesh Network Planning
—Wireless mesh networks are becoming prevalent in providing access infrastructure to the public. Design of such networks involve several important goals including resilience to f...
Chun-cheng Chen, Chandra Chekuri, D. Klabjan