Sciweavers

105 search results - page 15 / 21
» VALENS: A Knowledge Based Tool to Validate and Verify an Aio...
Sort
View
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
13 years 11 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
CBMS
2008
IEEE
14 years 1 months ago
Developing Competence Assessment Procedure for Spinal Anaesthesia
Traditional approaches of assessment in the medical domain are insufficient for evaluating trainees’ technical skills. Currently, many European medical training bodies are attem...
Dajie Zhang, Dietrich Albert, Cord Hockemeyer, Dor...
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
14 years 1 months ago
Using functional independence conditions to optimize the performance of latency-insensitive systems
—In latency-insensitive design shell modules are used to encapsulate system components (pearls) in order to interface them with the given latency-insensitive protocol and dynamic...
Cheng-Hong Li, Luca P. Carloni
UCS
2007
Springer
14 years 1 months ago
Mobility Helps Data Delivery in Disruption Tolerant Networks
Abstract. Sensor networks using mobile robots have recently been proposed to deal with data communication in disruption tolerant networks (DTNs) where an instantaneous end-to-end p...
Kaoru Sezaki, Niwat Thepvilojanapong, Yoshito Tobe
ECLIPSE
2006
ACM
14 years 1 months ago
Guidance through active concerns
Producing usable documentation has always been a tedious task, and even communicating important knowledge about a system among collaborators is difficult. This paper describes an ...
Barthélémy Dagenais, Harold Ossher