Sciweavers

4722 search results - page 27 / 945
» Representation-independent program analysis
Sort
View
IFIP
2010
Springer
13 years 2 months ago
Security Analysis of the MPLS Label Distribution Protocol
Daniel Guernsey, Aaron Engel, Jonathan Butts, Suje...
CC
2012
Springer
271views System Software» more  CC 2012»
12 years 3 months ago
Parallel Replication-Based Points-To Analysis
Pointer analysis is one of the most important static analyses during compilation. While several enhancements have been made to scale pointer analysis, the work on parallelizing the...
Sandeep Putta, Rupesh Nasre
PPDP
2010
Springer
13 years 5 months ago
Precise complexity analysis for efficient datalog queries
Given a set of Datalog rules, facts, and a query, answers to the query can be inferred bottom-up starting with the facts or top-down starting with the query. For efficiently answe...
K. Tuncay Tekle, Yanhong A. Liu
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 10 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
ESORICS
2011
Springer
12 years 7 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller