Sciweavers

1629 search results - page 30 / 326
» Infeasible Code Detection
Sort
View
OOPSLA
2010
Springer
13 years 8 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
IIHMSP
2006
IEEE
124views Multimedia» more  IIHMSP 2006»
14 years 4 months ago
Design of Collusion-Free Codes Based on MAI-Free Principle
The design of collusion-free codes for data hiding systems is investigated, and two new collusion-free codes are proposed in this work. They are called the Orthogonal Spreading (O...
Byung-Ho Cha, C. C. Jay Kuo
WEBI
2009
Springer
14 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
VTC
2006
IEEE
104views Communications» more  VTC 2006»
14 years 4 months ago
Low-Complexity Optimal Detection for Hybrid Space-Time Block Coding and Spatial Multiplexing
— The combination of space-time block codes (STBC) and spatial multiplexing (SM) schemes has the advantages of diversity gain and high data rate. For such STBC/SM hybrid systems,...
Yue Wu, Chintha Tellambura
ACSAC
2004
IEEE
14 years 1 months ago
Detecting Exploit Code Execution in Loadable Kernel Modules
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of kernel memory and I/O space. As a result, kernel-modu...
Haizhi Xu, Wenliang Du, Steve J. Chapin