Sciweavers

2957 search results - page 19 / 592
» Code analysis and CS-XML
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
ICCL
1992
IEEE
13 years 11 months ago
Static analysis of PostScript code
rogram. Our abstract interpretation algorithm may then be used to perform static type analysis. The analysis has applications in detecting probable errors in the PostScript code or...
R. Nigel Horspool, Jan Vitek
ICASSP
2011
IEEE
12 years 11 months ago
Analysis of non-coherent code tracking for NPSK systems in presence of noise and fading
Given the recent interest in non-binary forms of spreading sequences, there is a gap in knowledge on code tracking techniques for noise-like spreading codes. This paper presents t...
Ramin Vali, Stevan M. Berber
WWW
2010
ACM
14 years 2 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
ISSTA
2009
ACM
14 years 1 months ago
Advanced code coverage analysis using substring holes
Code coverage is a common aid in the testing process. It is generally used for marking the source code segments that were executed and, more importantly, those that were not execu...
Yoram Adler, Eitan Farchi, Moshe Klausner, Dan Pel...