Sciweavers

308 search results - page 27 / 62
» Symbolic execution of data paths
Sort
View
CSFW
2007
IEEE
14 years 3 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
ASPLOS
2012
ACM
12 years 4 months ago
Data races vs. data race bugs: telling the difference with portend
Even though most data races are harmless, the harmful ones are at the heart of some of the worst concurrency bugs. Alas, spotting just the harmful data races in programs is like ï...
Baris Kasikci, Cristian Zamfir, George Candea
ISER
2004
Springer
142views Robotics» more  ISER 2004»
14 years 2 months ago
Interactive Multi-Modal Robot Programming
As robots enter the human environment and come in contact with inexperienced users, they need to be able to interact with users in a multi-modal fashion—keyboard and mouse are n...
Soshi Iba, Christiaan J. J. Paredis, Pradeep K. Kh...
CCGRID
2008
IEEE
14 years 3 months ago
Joint Communication and Computation Task Scheduling in Grids
In this paper we present a multicost algorithm for the joint time scheduling of the communication and computation resources that will be used by a task. The proposed algorithm sel...
Kostas Christodoulopoulos, Nikolaos D. Doulamis, E...
CVPR
2000
IEEE
14 years 6 days ago
Detection of Obstacles in the Flight Path of an Aircraft
The National Aeronautics and Space Administration (NASA), along with members of the aircraft industry, recently developed technologies for a new supersonic aircraft. One of the te...
Tarak Gandhi, Mau-Tsuen Yang, Rangachar Kasturi, O...