Sciweavers

762 search results - page 132 / 153
» A study of the uniqueness of source code
Sort
View
DSN
2008
IEEE
13 years 10 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
EDCC
2008
Springer
13 years 10 months ago
Metrics for Object-Oriented Software Reliability Assessment - Application to a Flight Manager
In avionics domain, the software applications grew to millions of source lines of code representing important development expenditures. To cut the costs, the avionics suppliers ar...
Stéphanie Gaudan, Gilles Motet, Guillaume A...
USENIX
2003
13 years 10 months ago
Controlling Your PLACE in the File System with Gray-box Techniques
We present the design and implementation of PLACE, a gray-box library for controlling file layout on top of FFSlike file systems. PLACE exploits its knowledge of FFS layout poli...
James A. Nugent, Andrea C. Arpaci-Dusseau, Remzi H...
AAAI
1996
13 years 10 months ago
Interactive Information Retrieval Systems with Minimalist Representation
Almost any information you might want is becoming available on-line. The problem is how to find what you need. One strategy to improve access to existing information sources, is i...
Eric A. Domeshek, Smadar Kedar, Andrew S. Gordon
GLOBECOM
2008
IEEE
13 years 10 months ago
On the Impact of Inter-Cell Interference in LTE
—While intercell interference coordination (ICIC) for the downlink of multi-cell systems in general and orthogonal frequency division multiple access (OFDMA) networks in particul...
András Rácz, Norbert Reider, G&aacut...