Sciweavers

443 search results - page 66 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
INFORMATICALT
2002
91views more  INFORMATICALT 2002»
13 years 7 months ago
Bayesian Heuristic Approach to Scheduling
Abstract. Real life scheduling problems are solved by heuristics with parameters defined by experts, as usual. In this paper a new approach is proposed where the parameters of vari...
Jonas Mockus
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
ICDCS
2005
IEEE
14 years 1 months ago
Supporting Live Development of SOAP and CORBA Servers
We present middleware for a Server Development Environment that facilitates live development of SOAP and CORBA servers. As the underlying implementation platform, we use JPie, a t...
Sajeeva L. Pallemulle, Kenneth J. Goldman, Brandon...
DAC
2006
ACM
13 years 9 months ago
Systematic software-based self-test for pipelined processors
Software-based self-test (SBST) has recently emerged as an effective methodology for the manufacturing test of processors and other components in systems-on-chip (SoCs). By moving ...
Mihalis Psarakis, Dimitris Gizopoulos, Miltiadis H...
ATMOS
2007
124views Optimization» more  ATMOS 2007»
13 years 9 months ago
A Simulation/Optimization Framework for Locomotive Planning
Abstract. In this paper, we give an overview of the Locomotive Simulater/Optimizer (LSO) decision support system developed by us for railroads. This software is designed to imitate...
Artyom G. Nahapetyan, Ravindra K. Ahuja, F. Zeynep...