Sciweavers

739 search results - page 83 / 148
» A security framework for the analysis and design of software...
Sort
View
PLDI
2009
ACM
14 years 3 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
ICC
2007
IEEE
103views Communications» more  ICC 2007»
14 years 3 months ago
An Experimental Design Approach for Optimizing SMSE Waveforms to Minimize Coexistent Interference
Abstract— An experimental design approach is used to determine which factors (design parameters) of Spectrally Modulated, Spectrally Encoded (SMSE) waveforms have the greatest im...
Todd W. Beard, Michael A. Temple, Marcus L. Robert...
CLEIEJ
2008
97views more  CLEIEJ 2008»
13 years 9 months ago
A finite bidimensional wavelet framework for computer graphics: Image equalization
A lot of material has been written about wavelet theory. Most of these texts provide an elegant framework from the functional and real analysis point of view. The complete infinit...
Francisco Jose Benavides Murillo, Edgar Benavides ...
JSW
2008
98views more  JSW 2008»
13 years 8 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
SCAM
2005
IEEE
14 years 2 months ago
Pointer Analysis for Source-to-Source Transformations
We present a pointer analysis algorithm designed for source-to-source transformations. Existing techniques for pointer analysis apply a collection of inference rules to a dismantl...
Marcio Buss, Stephen A. Edwards, Bin Yao, Dan G. W...