Sciweavers

1898 search results - page 95 / 380
» Weak Keys for IDEA
Sort
View
JSS
2010
207views more  JSS 2010»
13 years 7 months ago
Adaptive Random Testing: The ART of test case diversity
Random testing is not only a useful testing technique in itself, but also plays a core role in many other testing methods. Hence, any significant improvement to random testing ha...
Tsong Yueh Chen, Fei-Ching Kuo, Robert G. Merkel, ...
POPL
2008
ACM
14 years 9 months ago
High-level small-step operational semantics for transactions
Software transactions have received significant attention as a way to simplify shared-memory concurrent programming, but insufficient focus has been given to the precise meaning o...
Katherine F. Moore, Dan Grossman
MOBIDE
2003
ACM
14 years 2 months ago
Consistency mechanisms for a distributed lookup service supporting mobile applications
This paper presents a general-purpose distributed lookup service, denoted Passive Distributed Indexing (PDI). PDI stores entries in form of (key, value) pairs in index caches loca...
Christoph Lindemann, Oliver P. Waldhorst
ECWEB
2009
Springer
130views ECommerce» more  ECWEB 2009»
14 years 3 months ago
Perspectives for Web Service Intermediaries: How Influence on Quality Makes the Difference
Abstract. In the service-oriented computing paradigm and the Web service architecture, the broker role is a key facilitator to leverage technical capabilities of loose coupling to ...
Ulrich Scholten, Robin Fischer, Christian Zirpins
NDSS
2008
IEEE
14 years 3 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...