Sciweavers

2725 search results - page 520 / 545
» Constraint Solving for Interpolation
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
14 years 3 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
VTC
2006
IEEE
121views Communications» more  VTC 2006»
14 years 3 months ago
Multiobjective QoS-Oriented Planning for Indoor Wireless LANs
Abstract— This paper describes an automatic wireless LAN access points planning approach based on a multicriteria modelling and solving. A realistic and efficient wLAN planning ...
Katia Jaffrès-Runser, Jean-Marie Gorce, St&...
BROADNETS
2005
IEEE
14 years 3 months ago
Optimal path selection for ethernet over SONET under inaccurate link-state information
— Ethernet over SONET (EoS) is a popular approach for interconnecting geographically distant Ethernet segments using a SONET transport infrastructure. It typically uses virtual c...
Satyajeet Ahuja, Marwan Krunz, Turgay Korkmaz
INFOCOM
2005
IEEE
14 years 3 months ago
Smart power-saving mode for IEEE 802.11 wireless LANs
StaticPSM (Power-Saving Mode)schemes employed in the current IEEE 802.11 implementations could not provide any delag-performance guarantee because of their fixed wakeup intervals. ...
Daji Qiao, Kang G. Shin