Sciweavers

3667 search results - page 107 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
CAV
2011
Springer
253views Hardware» more  CAV 2011»
13 years 17 days ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
CCS
2011
ACM
12 years 9 months ago
BitShred: feature hashing malware for scalable triage and semantic analysis
The sheer volume of new malware found each day is growing at an exponential pace. This growth has created a need for automatic malware triage techniques that determine what malwar...
Jiyong Jang, David Brumley, Shobha Venkataraman
JCPHY
2011
192views more  JCPHY 2011»
12 years 12 months ago
Fast analysis of molecular dynamics trajectories with graphics processing units - Radial distribution function histogramming
The calculation of radial distribution functions (RDFs) from molecular dynamics trajectory data is a common and computationally expensive analysis task. The rate limiting step in ...
Benjamin G. Levine, John E. Stone, Axel Kohlmeyer
METRICS
1997
IEEE
14 years 1 months ago
An Empirical Analysis of Equivalence Partitioning, Boundary Value Analysis and Random Testing
An experiment comparing the effectiveness of equivalence partitioning (EP), boundary value analysis (BVA), and random testing was performed, based on an operational avionics syste...
Stuart Reid
DATE
1997
IEEE
97views Hardware» more  DATE 1997»
14 years 1 months ago
Analysis of 3D conjugate heat transfers in electronics
An efficient method for the analysis of real 3D conjugate heat transfer for electronic devices is presented. This methodology is based on the coupling of two software : a conducti...
J. P. Fradin, L. Molla, B. Desaunettes