Sciweavers

3384 search results - page 535 / 677
» More Testable Properties
Sort
View
CHI
2011
ACM
13 years 1 months ago
Audience behavior around large interactive cylindrical screens
Non-planar screens, such as columns, have been a popular means for displaying information for a long time. In contrast to traditional displays their digital counterparts are mainl...
Gilbert Beyer, Florian Alt, Jörg Müller,...
FASE
2011
Springer
13 years 1 months ago
Theoretical Aspects of Compositional Symbolic Execution
Given a program and an assertion in that program, determining if the assertion can fail is one of the key applications of program analysis. Symbolic execution is a well-known techn...
Dries Vanoverberghe, Frank Piessens
FORTE
2011
13 years 1 months ago
A Framework for Verifying Data-Centric Protocols
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
Yuxin Deng, Stéphane Grumbach, Jean-Fran&cc...
IEEESP
2011
13 years 1 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
INFOCOM
2011
IEEE
13 years 1 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...