Sciweavers

3238 search results - page 57 / 648
» Not Enough Points Is Enough
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
ITS4: A Static Vulnerability Scanner for C and C++ Code
We describe ITS4, a tool for statically scanning security-critical C source code for vulnerabilities. Compared to other approaches, our scanning technique stakes out a new middle ...
John Viega, J. T. Bloch, Y. Kohno, Gary McGraw
ICC
2000
IEEE
157views Communications» more  ICC 2000»
14 years 2 months ago
Adaptive Reliable Multicast
We present a new reliable multicast protocol, called ARM for Adaptive Reliable Multicast. Our protocol integrates ARQ and FEC techniques. The objectives of ARM are (1) reduce the ...
Jaehee Yoon, Azer Bestavros, Ibrahim Matta
ICIAP
1999
ACM
14 years 2 months ago
Cellular Automata Based Optical Flow Computation for "Just-in-Time" Applications
Real-world tasks often require real-time performances. However, in many practical cases, “just in time” responses are sufficient. This means that a system should be efficien...
Giovanni Adorni, Stefano Cagnoni, Monica Mordonini
ICLP
1994
Springer
14 years 2 months ago
Entailment of Finite Domain Constraints
Using a glass-box theory of finite domain constraints, FD, we show how the entailment of user-defined constraints can be expressed by antimonotone FD constraints. We also provide a...
Björn Carlson, Mats Carlsson, Daniel Diaz
FMCAD
2006
Springer
14 years 1 months ago
Tracking MUSes and Strict Inconsistent Covers
In this paper, a new heuristic-based approach is introduced to extract minimally unsatisfiable subformulas (in short, MUSes) of SAT instances. It is shown that it often outperforms...
Éric Grégoire, Bertrand Mazure, C&ea...