Sciweavers

1687 search results - page 40 / 338
» Which pointer analysis should I use
Sort
View
ASIACRYPT
2009
Springer
14 years 3 months ago
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
We look at iterated power generators si = se i−1 mod N for a random seed s0 ∈ ZN that in each iteration output a certain amount of bits. We show that heuristically an output of...
Mathias Herrmann, Alexander May
AGENTS
2000
Springer
14 years 1 months ago
Dynamically altering agent behaviors using natural language instructions
Smart avatars are virtual human representations controlled by real people. Given instructions interactively, smart avatars can act as autonomous or reactive agents. During a real-...
Rama Bindiganavale, William Schuler, Jan M. Allbec...
FMCO
2003
Springer
114views Formal Methods» more  FMCO 2003»
14 years 2 months ago
Synchronous Closing and Flow Analysis for Model Checking Timed Systems
Abstract. Formal methods, in particular model checking, are increasingly accepted as integral part of system development. With large software systems beyond the range of fully auto...
Natalia Ioustinova, Natalia Sidorova, Martin Steff...
BNCOD
2003
127views Database» more  BNCOD 2003»
13 years 10 months ago
Performance Evaluation and Analysis of K-Way Join Variants for Association Rule Mining
Data mining aims at discovering important and previously unknown patterns from the dataset in the underlying database. Database mining performs mining directly on data stored in r...
P. Mishra, Sharma Chakravarthy
ICSM
1998
IEEE
14 years 1 months ago
Analysis of Programs with Exception-Handling Constructs
Analysis techniques, such as control-flow, data-flow, and control-dependence, are used for a variety of maintenance tasks, including regression testing, dynamic execution profilin...
Saurabh Sinha, Mary Jean Harrold