Sciweavers

1898 search results - page 305 / 380
» Weak Keys for IDEA
Sort
View
TACAS
2010
Springer
160views Algorithms» more  TACAS 2010»
13 years 7 months ago
Efficient Detection of Errors in Java Components Using Random Environment and Restarts
Software model checkers are being used mostly to discover specific types of errors in the code, since exhaustive verification of complex programs is not possible due to state explo...
Pavel Parizek, Tomás Kalibera
TAP
2010
Springer
134views Hardware» more  TAP 2010»
13 years 7 months ago
Testing First-Order Logic Axioms in Program Verification
Program verification systems based on automated theorem provers rely on user-provided axioms in order to verify domain-specific properties of code. However, formulating axioms corr...
Ki Yung Ahn, Ewen Denney
USS
2010
13 years 7 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich
WINE
2010
Springer
148views Economy» more  WINE 2010»
13 years 7 months ago
False-Name-Proofness in Social Networks
In mechanism design, the goal is to create rules for making a decision based on the preferences of multiple parties (agents), while taking into account that agents may behave stra...
Vincent Conitzer, Nicole Immorlica, Joshua Letchfo...
CEC
2009
IEEE
13 years 7 months ago
Open-ended on-board Evolutionary Robotics for robot swarms
The SYMBRION project stands at the crossroads of Artificial Life and Evolutionary Robotics: a swarm of real robots undergoes online evolution by exchanging information in a decentr...
G. Baele, Nicolas Bredeche, Evert Haasdijk, Steven...