Sciweavers

4341 search results - page 821 / 869
» Quantitative Model checking
Sort
View
CCS
2005
ACM
14 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
GCB
2004
Springer
101views Biometrics» more  GCB 2004»
14 years 3 months ago
Kleene's Theorem and the Solution of Metabolic Carbon Labeling Systems
: Carbon Labeling Systems (CLS) are large equation systems that describe the dynamics of labeled carbon atoms in a metabolic network. The rapid solution of these systems is the alg...
Nicole Isermann, Michael Weitzel, Wolfgang Wiecher...
ITCC
2003
IEEE
14 years 3 months ago
A New Quality of Service Metric for Hard/Soft Real-Time Applications
Real-time applications often have mixed hard and soft deadlines, can be preempted subject to the cost of context switching or the restart of computation, and have various data dep...
Shaoxiong Hua, Gang Qu
METRICS
2003
IEEE
14 years 3 months ago
Using Prior-Phase Effort Records for Re-estimation During Software Projects
Estimating the effort required for software process activities continues to present difficulties for software engineers, particularly given the uncertainty and subjectivity associ...
Stephen G. MacDonell, Martin J. Shepperd
SPAA
2010
ACM
14 years 2 months ago
Implementing and evaluating nested parallel transactions in software transactional memory
Transactional Memory (TM) is a promising technique that simplifies parallel programming for shared-memory applications. To date, most TM systems have been designed to efficientl...
Woongki Baek, Nathan Grasso Bronson, Christos Kozy...