Sciweavers

877 search results - page 168 / 176
» Model Based Development of Safety-Critical Systems Using Tem...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 12 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
DSD
2003
IEEE
138views Hardware» more  DSD 2003»
14 years 28 days ago
A Two-step Genetic Algorithm for Mapping Task Graphs to a Network on Chip Architecture
Network on Chip (NoC) is a new paradigm for designing core based System on Chip which supports high degree of reusability and is scalable. In this paper we describe an efficient t...
Tang Lei, Shashi Kumar
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
14 years 28 days ago
A Content Analytic Comparison of FTF and ALN Case-Study Discussions
While much research has shown that ALNs can produce learning equivalent to FTF classrooms, there has been little empirical research that explicitly and rigorously explores similar...
Robert Heckman, Hala Annabi
SIGSOFT
2000
ACM
14 years 8 hour ago
Automated systematic testing for constraint-based interactive services
Constraint-based languages can express in a concise way the complex logic of a new generation of interactive services for applications such as banking or stock trading, that must ...
Patrice Godefroid, Lalita Jategaonkar Jagadeesan, ...
PLDI
2009
ACM
14 years 8 months ago
Efficiently and precisely locating memory leaks and bloat
Inefficient use of memory, including leaks and bloat, remain a significant challenge for C and C++ developers. Applications with these problems become slower over time as their wo...
Gene Novark, Emery D. Berger, Benjamin G. Zorn