Sciweavers

1415 search results - page 202 / 283
» Verified systems by composition from verified components
Sort
View
CCS
2007
ACM
13 years 11 months ago
A framework for diversifying windows native APIs to tolerate code injection attacks
We present a framework to prevent code injection attacks in MS Windows using Native APIs in the operating system. By adopting the idea of diversity, this approach is implemented i...
Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis...
WWW
2009
ACM
14 years 8 months ago
Personalized recommendation on dynamic content using predictive bilinear models
In Web-based services of dynamic content (such as news articles), recommender systems face the difficulty of timely identifying new items of high-quality and providing recommendat...
Wei Chu, Seung-Taek Park
CADE
2008
Springer
14 years 8 months ago
Certifying a Tree Automata Completion Checker
Tree automata completion is a technique for the verification of infinite state systems. It has already been used for the verification of cryptographic protocols and the prototyping...
Benoît Boyer, Thomas Genet, Thomas P. Jensen
VTC
2008
IEEE
131views Communications» more  VTC 2008»
14 years 2 months ago
Downtilted Base Station Antennas - A Simulation Model Proposal and Impact on HSPA and LTE Performance
— This paper proposes a low-complexity model for vertical antenna radiation patterns, e.g. for inclusion in systemlevel simulations. They can be seen as extensions to the horizon...
Fredrik Gunnarsson, Martin N. Johansson, Anders Fu...
MEMOCODE
2007
IEEE
14 years 2 months ago
Towards Equivalence Checking Between TLM and RTL Models
The always increasing complexity of digital system is overcome in design flows based on Transaction Level Modeling (TLM) by designing and verifying the system at difbstraction le...
Nicola Bombieri, Franco Fummi, Graziano Pravadelli...