Sciweavers

622 search results - page 98 / 125
» Answer Set Programming and Bounded Model Checking
Sort
View
98
Voted
ICSE
2005
IEEE-ACM
16 years 2 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
SARA
2009
Springer
15 years 8 months ago
Some Interval Approximation Techniques for MINLP
MINLP problems are hard constrained optimization problems, with nonlinear constraints and mixed discrete continuous variables. They can be solved using a Branch-and-Bound scheme c...
Nicolas Berger, Laurent Granvilliers
124
Voted
PLDI
2009
ACM
15 years 9 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
135
Voted
IWMM
2010
Springer
140views Hardware» more  IWMM 2010»
15 years 4 months ago
Parametric inference of memory requirements for garbage collected languages
The accurate prediction of program's memory requirements is a critical component in software development. Existing heap space analyses either do not take deallocation into ac...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...
IADIS
2008
15 years 3 months ago
Towards A Model-Driven Engineering Approach of Data Mining
Nowadays, data mining is based on low-level speci cations of the employed techniques typically bounded to a speci c analysis platform. Therefore, data mining lacks a modelling arc...
Jesús Pardillo, José Jacobo Zubcoff,...