Sciweavers

890 search results - page 63 / 178
» Programming language methods in computer security
Sort
View
AINA
2009
IEEE
14 years 2 months ago
Layer-Based Dome Contents Creation Using Scenario Description Language
—In recent years, dome display has become popular, and it is desired to establish a method to create dome image contents easily. In this study, psychophysical experiment was cond...
Tetsuro Ogi, Daisuke Furuyama, Tetsuro Fujise
ICTAI
2006
IEEE
14 years 4 months ago
Graph Grammar Induction on Structural Data for Visual Programming
Computer programs that can be expressed in two or more dimensions are typically called visual programs. The underlying theories of visual programming languages involve graph gramm...
Keven Ates, Jacek P. Kukluk, Lawrence B. Holder, D...
GI
2009
Springer
14 years 2 months ago
Reasoning about Contextual Equivalence: From Untyped to Polymorphically Typed Calculi
: This paper describes a syntactical method for contextual equivalence in polymorphically typed lambda-calculi. Our specific calculus has letrec as cyclic let, data constructors, ...
David Sabel, Manfred Schmidt-Schauß, Frederi...
ACTAC
2002
102views more  ACTAC 2002»
13 years 10 months ago
Handling Pointers and Unstructured Statements in the Forward Computed Dynamic Slice Algorithm
Different program slicing methods are used for debugging, testing, reverse engineering and maintenance. Slicing algorithms can be classified as a static slicing or dynamic slicing...
Csaba Faragó, Tamás Gergely
CCS
2007
ACM
14 years 2 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...