Sciweavers

132 search results - page 22 / 27
» Multi-resolution Exploration in Continuous Spaces
Sort
View
IEEEARES
2010
IEEE
13 years 11 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
CSFW
2010
IEEE
13 years 11 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
CAE
2007
13 years 9 months ago
memory [en]code - Building a Collective Memory within a Tabletop Installation
In this paper, we introduce memory [en]code, a project that evolved through an art+science collaboration. memory [en]code is an interactive tabletop installation that visualizes d...
Holly Schmidt, Uta Hinrichs, Alan Dunning, M. Shee...
ASPDAC
2008
ACM
124views Hardware» more  ASPDAC 2008»
13 years 9 months ago
MaizeRouter: Engineering an effective global router
In this paper, we present the complete design and architectural details of MAIZEROUTER. MAIZEROUTER reflects a significant leap in progress over existing publicly available routing...
Michael D. Moffitt
GISCIENCE
2010
Springer
231views GIS» more  GISCIENCE 2010»
13 years 8 months ago
Efficient Data Collection and Event Boundary Detection in Wireless Sensor Networks Using Tiny Models
Using wireless geosensor networks (WGSN), sensor nodes often monitor a phenomenon that is both continuous in time and space. However, sensor nodes take discrete samples, and an ana...
Kraig King, Silvia Nittel