Sciweavers

2957 search results - page 42 / 592
» Code analysis and CS-XML
Sort
View
INFOCOM
1996
IEEE
13 years 11 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
CORR
2008
Springer
137views Education» more  CORR 2008»
13 years 7 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
VMCAI
2005
Springer
14 years 26 days ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
FORTE
2004
13 years 8 months ago
Model-Checking Plus Testing: From Software Architecture Analysis to Code Testing
Software Model-Checking and Testing are some of the most used techniques to analyze software systems and identify hidden faults. While software model-checking allows for an exhaust...
Antonio Bucchiarone, Henry Muccini, Patrizio Pelli...
ICIP
2003
IEEE
14 years 9 months ago
Improved H.264/AVC coding using texture analysis and synthesis
We assume that the textures in a video scene can be classified into two categories: textures with unimportant subjective details and the remainder. We utilize this assumption for ...
Patrick Ndjiki-Nya, Bela Makai, Gabi Blattermann, ...