Sciweavers

4233 search results - page 189 / 847
» Three Paths to Effectiveness
Sort
View
APSEC
2005
IEEE
15 years 10 months ago
Model Checking Interrupt-Dependent Software
Embedded control programs are hard to analyse because their behaviour depends on how they interact with hardware devices. In particular, embedded code typically uses interrupts to...
Colin J. Fidge, Phil Cook
IPCCC
2005
IEEE
15 years 10 months ago
On transport daemons for small collaborative applications over wide-area networks
A number of science applications employing collaborative computations require transport methods that guarantee end-to-end performance at the application level. Throughputs achieve...
Qishi Wu, Nageswara S. V. Rao, S. Sitharama Iyenga...
CP
2005
Springer
15 years 10 months ago
Symmetry and Consistency
We introduce a novel and exciting research area: symmetrising levels of consistency to produce stronger forms of consistency and more efficient mechanisms for establishing them. W...
Ian P. Gent, Tom Kelsey, Steve Linton, Colva M. Ro...
107
Voted
ATS
2003
IEEE
112views Hardware» more  ATS 2003»
15 years 10 months ago
Domain Testing Based on Character String Predicate
Domain testing is a well-known software testing technique. Although research tasks have been initiated in domain testing, automatic test data generation based on character string ...
Ruilian Zhao, Michael R. Lyu, Yinghua Min
INFOCOM
2003
IEEE
15 years 10 months ago
Detecting Network Intrusions via Sampling: A Game Theoretic Approach
In this paper, we consider the problem of detecting an intruding packet in a communication network. Detection is accomplished by sampling a portion of the packets transiting selec...
Murali S. Kodialam, T. V. Lakshman