Sciweavers

962 search results - page 101 / 193
» Input validation analysis and testing
Sort
View
VRCAI
2009
ACM
15 years 9 months ago
Context aware, multimodal, and semantic rendering engine
Nowadays, several techniques exist to render digital content such as graphics, audio, haptic, etc. Unfortunately, they require different faculties that cannot always be applied, e...
Patrick Salamin, Daniel Thalmann, Fréd&eacu...
ICSM
2003
IEEE
15 years 7 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
CORR
2006
Springer
96views Education» more  CORR 2006»
15 years 2 months ago
The intersection and the union of the asynchronous systems
The asynchronous systems f are the models of the asynchronous circuits from digital electrical engineering. They are multi-valued functions that associate to each input u : R {0, ...
Serban E. Vlad
125
Voted
BMCBI
2008
128views more  BMCBI 2008»
15 years 2 months ago
SIGffRid: A tool to search for sigma factor binding sites in bacterial genomes using comparative approach and biologically drive
Background: Many programs have been developed to identify transcription factor binding sites. However, most of them are not able to infer two-word motifs with variable spacer leng...
Fabrice Touzain, Sophie Schbath, Isabelle Debled-R...
136
Voted
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 6 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou