Sciweavers

12334 search results - page 191 / 2467
» The Use of C
Sort
View
CCS
2007
ACM
15 years 10 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
IPSN
2007
Springer
15 years 10 months ago
Acoustic source localization using the acoustic ENSBox
Field biologists use animal sounds to discover the presence of individuals and to study their behavior. The recent development of new deployable acoustic sensor platforms presents...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...
TACAS
2012
Springer
277views Algorithms» more  TACAS 2012»
14 years 6 days ago
Proving Reachability Using FShell - (Competition Contribution)
FShell is an automated white-box test-input generator for C programs, computing test data with respect to user-specified code coverage criteria. The pillars of FShell are the decl...
Andreas Holzer, Daniel Kroening, Christian Schallh...
DATE
2008
IEEE
81views Hardware» more  DATE 2008»
15 years 11 months ago
Using UML as Front-end for Heterogeneous Software Code Generation Strategies
In this paper we propose an embedded software design flow, which starts from an UML model and provides automatic mapping to other models like Simulink or finite-state machines (FS...
Lisane B. de Brisolara, Marcio F. da S. Oliveira, ...
TOOLS
1998
IEEE
15 years 9 months ago
Implementation of a Geospatial Imagery Digital Library Using Java and CORBA
We have implemented a prototype distributed system for managing and accessing a digital library of geospatial imagery over a wide-area network. The system conforms to a subset of ...
Paul D. Coddington, Kenneth A. Hawick, K. E. Kerry...