Sciweavers

741 search results - page 88 / 149
» Tools and techniques for Network Forensics
Sort
View
IPPS
2006
IEEE
14 years 2 months ago
Workflow fine-grained concurrency with automatic continuation
Workflow enactment systems are becoming an effective solution to ease programming, deployment and execution of distributed applications in several domains such as telecommunicatio...
Giancarlo Tretola, Eugenio Zimeo
ISSS
1997
IEEE
103views Hardware» more  ISSS 1997»
14 years 1 months ago
Fast and Extensive System-Level Memory Exploration for ATM Applications
In this paper, our memory architecture exploration methodology and CAD techniques for network protocol applications are presented. Prototype tools have been implemented, and appli...
Peter Slock, Sven Wuytack, Francky Catthoor, Gjalt...
JSAT
2006
108views more  JSAT 2006»
13 years 8 months ago
Translating Pseudo-Boolean Constraints into SAT
In this paper, we describe and evaluate three different techniques for translating pseudoboolean constraints (linear constraints over boolean variables) into clauses that can be h...
Niklas Eén, Niklas Sörensson
AI
2002
Springer
13 years 8 months ago
QUANTUM: A Function-Based Question Answering System
Abstract In this paper, we describe our Question Answering (QA) system called QUANTUM. The goal of QUANTUM is to find the answer to a natural language question in a large document ...
Luc Plamondon, Leila Kosseim
NFM
2011
335views Formal Methods» more  NFM 2011»
13 years 3 months ago
CORAL: Solving Complex Constraints for Symbolic PathFinder
Symbolic execution is a powerful automated technique for generating test cases. Its goal is to achieve high coverage of software. One major obstacle in adopting the technique in pr...
Matheus Souza, Mateus Borges, Marcelo d'Amorim, Co...