Sciweavers

622 search results - page 98 / 125
» Answer Set Programming and Bounded Model Checking
Sort
View
ICSE
2005
IEEE-ACM
14 years 8 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
SARA
2009
Springer
14 years 2 months ago
Some Interval Approximation Techniques for MINLP
MINLP problems are hard constrained optimization problems, with nonlinear constraints and mixed discrete continuous variables. They can be solved using a Branch-and-Bound scheme c...
Nicolas Berger, Laurent Granvilliers
PLDI
2009
ACM
14 years 2 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
IWMM
2010
Springer
140views Hardware» more  IWMM 2010»
13 years 9 months ago
Parametric inference of memory requirements for garbage collected languages
The accurate prediction of program's memory requirements is a critical component in software development. Existing heap space analyses either do not take deallocation into ac...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...
IADIS
2008
13 years 9 months ago
Towards A Model-Driven Engineering Approach of Data Mining
Nowadays, data mining is based on low-level speci cations of the employed techniques typically bounded to a speci c analysis platform. Therefore, data mining lacks a modelling arc...
Jesús Pardillo, José Jacobo Zubcoff,...