Sciweavers

819 search results - page 28 / 164
» Fractal symbolic analysis
Sort
View
CCS
2010
ACM
13 years 8 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
ICDAR
2003
IEEE
14 years 1 months ago
Symbolic Pruning in a Structural Approach to Engineering Drawing Analysis
Interpretation of paper drawings has received a good deal of attention over the last decade. Progress has also been made in related areas such as direct interpretation of human dr...
Tom Henderson, Lavanya Swaminatha
TGC
2010
Springer
13 years 6 months ago
Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode
Recent work in resource analysis has translated the idea of amortised resource analysis to imperative languages using a program logic that allows mixing of assertions about heap sh...
David Aspinall, Robert Atkey, Kenneth MacKenzie, D...
FDL
2004
IEEE
14 years 10 days ago
Semi-Symbolic Modeling and Analysis of Noise in Heterogeneous Systems
The article describes semi-symbolic methods for the analysis of control and signal processing systems, including static and dynamic uncertainties. This above mentioned semi-symbol...
Christoph Grimm, Wilhelm Heupke, Klaus Waldschmidt
SACMAT
2009
ACM
14 years 3 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....