Sciweavers

791 search results - page 94 / 159
» Characterizing zero-derivative points
Sort
View
KBSE
2009
IEEE
14 years 4 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
P2P
2009
IEEE
126views Communications» more  P2P 2009»
14 years 4 months ago
Robust Lifetime Measurement in Large-Scale P2P Systems with Non-Stationary Arrivals
—Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work [26] has shown that direct sampling...
Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri...
INFOCOM
2009
IEEE
14 years 4 months ago
DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks
—Congestion control in wireless multi-hop networks is challenging and complicated because of two reasons. First, interference is ubiquitous and causes loss in the shared medium. ...
Ajit Warrier, Sankararaman Janakiraman, Sangtae Ha...
FSTTCS
2009
Springer
14 years 4 months ago
Iterative Methods in Combinatorial Optimization
We describe a simple iterative method for proving a variety of results in combinatorial optimization. It is inspired by Jain’s iterative rounding method (FOCS 1998) for designing...
R. Ravi
SAGT
2009
Springer
108views Game Theory» more  SAGT 2009»
14 years 4 months ago
On the Planner's Loss Due to Lack of Information in Bayesian Mechanism Design
In this paper we study a large class of resource allocation problems with an important complication, the utilization cost of a given resource is private information of a profit ma...
José R. Correa, Nicolas Figueroa