Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
27
search results - page 6 / 6
»
Regular Symbolic Analysis of Dynamic Networks of Pushdown Sy...
Sort
relevance
views
votes
recent
update
View
thumb
title
135
Voted
DSN
2008
IEEE
123
views
Computer Networks
»
more
DSN 2008
»
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
15 years 5 months ago
Download
www.cs.purdue.edu
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
claim paper
Read More »
129
Voted
ATVA
2008
Springer
144
views
Hardware
»
more
ATVA 2008
»
Tests, Proofs and Refinements
15 years 5 months ago
Download
pswlab.kaist.ac.kr
1 : Logic in Specification and Verification (abstract) Natarajan Shankar (SRI) Session Chair : Sungdeok Cha 12 : 00 13 : 00 Lunch 13 : 00 15 : 00 2 : Boolean Modeling of Cell Biolo...
Sriram K. Rajamani
claim paper
Read More »
« Prev
« First
page 6 / 6
Last »
Next »