Sciweavers

1186 search results - page 186 / 238
» On Designing an Experiment to Evaluate a Reverse Engineering...
Sort
View
SIGMETRICS
2009
ACM
149views Hardware» more  SIGMETRICS 2009»
14 years 4 months ago
On the treeness of internet latency and bandwidth
Existing empirical studies of Internet structure and path properties indicate that the Internet is tree-like. This work quantifies the degree to which at least two important Inte...
Venugopalan Ramasubramanian, Dahlia Malkhi, Fabian...
CLEIEJ
2004
137views more  CLEIEJ 2004»
13 years 10 months ago
A Component-based Product Line for Workflow Management Systems
This paper presents a component-based product line for workflow management systems. The process followed to design the product line was based on the Catalysis method. Extensions w...
Itana Maria de Souza Gimenes, Fabrício Rica...
TACAS
2009
Springer
127views Algorithms» more  TACAS 2009»
14 years 4 months ago
From Tests to Proofs
We describe the design and implementation of an automatic invariant generator for imperative programs. While automatic invariant generation through constraint solving has been exte...
Ashutosh Gupta, Rupak Majumdar, Andrey Rybalchenko
ASPLOS
2006
ACM
14 years 4 months ago
HeapMD: identifying heap-based bugs using anomaly detection
We present the design, implementation, and evaluation of HeapMD, a dynamic analysis tool that finds heap-based bugs using anomaly detection. HeapMD is based upon the observation ...
Trishul M. Chilimbi, Vinod Ganapathy
ISSRE
2005
IEEE
14 years 3 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier