Sciweavers

1316 search results - page 259 / 264
» Open Issues in Industrial Use Case Modeling
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
13 years 11 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
WICON
2008
13 years 9 months ago
A study of MAC schemes for wireless sensor networks powered by ambient energy harvesting
Energy consumption is a perennial issue in the design of wireless sensor networks which typically rely on portable sources like batteries for power. Recent advances in ambient ene...
Zhi Ang Eu, Winston Khoon Guan Seah, Hwee Pink Tan
JUCS
2008
162views more  JUCS 2008»
13 years 7 months ago
Composition and Run-time Adaptation of Mismatching Behavioural Interfaces
Abstract: Reuse of software entities such as components or Web services raise composition issues since, most of the time, they present mismatches in their interfaces. These mismatc...
Javier Cámara, Gwen Salaün, Carlos Can...
WIOPT
2010
IEEE
13 years 5 months ago
On maximizing collaboration in Wireless Mesh Networks without monetary incentives
—In distributed network settings, where nodes are not under the control of a single administrative entity, the fulfillment of fundamental network operations is heavily dependent...
Gabriel Popa, Éric Gourdin, Franck Legendre...
TAP
2008
Springer
93views Hardware» more  TAP 2008»
13 years 7 months ago
Pex-White Box Test Generation for .NET
Pex automatically produces a small test suite with high code coverage for a .NET program. To this end, Pex performs a systematic program analysis (using dynamic symbolic execution,...
Nikolai Tillmann, Jonathan de Halleux