Sciweavers

981 search results - page 183 / 197
» Symbolic pointer analysis
Sort
View
VTC
2010
IEEE
145views Communications» more  VTC 2010»
13 years 7 months ago
Performance of Multihop Wireless Links over Generalized-K Fading Channels
— The performance of multihop links is studied in this contribution by both analysis and simulations, when communicating over Generalized-K (KG) fading channels. The performance ...
Jianfei Cao, Lie-Liang Yang, Zhangdui Zhong
ENASE
2009
179views Hardware» more  ENASE 2009»
13 years 6 months ago
Evolving System's Modeling and Simulation through Reflective Petri Nets
Abstract. The design of dynamic discrete-event systems calls for adequate modeling formalisms and tools to manage possible changes occurring during system's lifecycle. A commo...
Lorenzo Capra, Walter Cazzola
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 6 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
ICST
2009
IEEE
13 years 6 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
CG
2011
Springer
13 years 3 months ago
Multiresolutions numerically from subdivisions
In previous work we introduced a construction to produce multiresolutions from given subdivisions. A portion of that construction required solving bilinear equations using a symbo...
Richard H. Bartels, Faramarz Samavati