Sciweavers

553 search results - page 78 / 111
» Verified, Executable Parsing
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Using genetic algorithms to generate test plans for functionality testing
Like in other fields, computer products (applications, hardware, etc.), before being marketed, require some level of testing to verify whether they meet their design and function...
Francisca Emanuelle Vieira, Francisco Martins, Raf...
ISSTA
2006
ACM
14 years 2 months ago
DSD-Crasher: a hybrid analysis tool for bug finding
DSD-Crasher is a bug finding tool that follows a three-step approach to program analysis: D. Capture the program’s intended execution behavior with dynamic invariant detection....
Christoph Csallner, Yannis Smaragdakis
ISCAS
2005
IEEE
165views Hardware» more  ISCAS 2005»
14 years 2 months ago
An area-efficient and protected network interface for processing-in-memory systems
Abstract- This paper describes the implementation of an areaefficient and protected user memory-mapped network interface, the pbuf (Parcel Buffer), for the Data IntensiVe Architect...
Sumit D. Mediratta, Craig S. Steele, Jeff Sondeen,...
PDP
2005
IEEE
14 years 2 months ago
Tuning Dynamic Web Applications using Fine-Grain Analysis
In this paper we present a methodology to analyze the behavior and performance of Java application servers using a performance analysis framework. This framework considers all lev...
Jordi Guitart, David Carrera, Jordi Torres, Eduard...
ADHOCNOW
2005
Springer
14 years 2 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves