An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
A content-addressable storage (CAS) system is a valuable tool for building storage solutions, providing efficiency by automatically detecting and eliminating duplicate blocks; it ...
Cristian Ungureanu, Benjamin Atkin, Akshat Aranya,...
Active contour methods like snakes, have become a basic tool in computer vision and image analysis over the last years. They have proven to be adequate for the task of finding bou...
Benjamin Seppke, Leonie Dreschler-Fischer, Nathana...
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. Analyzing the execution of such processes is critical for enforcing business ...
This paper presents a new technique, called Symbolic Program Decomposition (or SPD), for symbolic execution of multiple paths that is more scalable than existing techniques, which...