Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
27
search results - page 6 / 6
»
Regular Symbolic Analysis of Dynamic Networks of Pushdown Sy...
Sort
relevance
views
votes
recent
update
View
thumb
title
28
click to vote
DSN
2008
IEEE
123
views
Computer Networks
»
more
DSN 2008
»
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
13 years 11 months ago
Download
www.cs.purdue.edu
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
claim paper
Read More »
28
click to vote
ATVA
2008
Springer
144
views
Hardware
»
more
ATVA 2008
»
Tests, Proofs and Refinements
13 years 11 months ago
Download
pswlab.kaist.ac.kr
1 : Logic in Specification and Verification (abstract) Natarajan Shankar (SRI) Session Chair : Sungdeok Cha 12 : 00 13 : 00 Lunch 13 : 00 15 : 00 2 : Boolean Modeling of Cell Biolo...
Sriram K. Rajamani
claim paper
Read More »
« Prev
« First
page 6 / 6
Last »
Next »