Sciweavers

59 search results - page 9 / 12
» Constraint Analysis for DSP Code Generation
Sort
View
CCS
2011
ACM
12 years 8 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
MEMOCODE
2008
IEEE
14 years 3 months ago
From Data to Events: Checking Properties on the Control of a System
We present a component-based description language for heterogeneous systems composed of several data flow processing components and a unique eventbased controller. Descriptions a...
Christophe Jacquet, Frédéric Boulang...
ICDAR
2011
IEEE
12 years 8 months ago
Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes
—This paper proposes a method for low resolution QR-code recognition. A QR-code is a two-dimensional binary symbol that can embed various information such as characters and numbe...
Yuji Kato, Daisuke Deguchi, Tomokazu Takahashi, Ic...
JSS
2002
90views more  JSS 2002»
13 years 8 months ago
Producing reliable software: an experiment
A customer of high assurance software recently sponsored a software engineering experiment in which a small real-time software system was developed concurrently by two popular sof...
Carol Smidts, Xin Huang, James C. Widmaier
PLDI
2010
ACM
14 years 1 months ago
Jinn: synthesizing dynamic bug detectors for foreign language interfaces
Programming language specifications mandate static and dynamic analyses to preclude syntactic and semantic errors. Although individual languages are usually well-specified, comp...
Byeongcheol Lee, Ben Wiedermann, Martin Hirzel, Ro...