Sciweavers

2236 search results - page 315 / 448
» Secure Software Design in Practice
Sort
View
121
Voted
WWW
2009
ACM
16 years 3 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
127
Voted
HPCA
2008
IEEE
16 years 3 months ago
Thread-safe dynamic binary translation using transactional memory
Dynamic binary translation (DBT) is a runtime instrumentation technique commonly used to support profiling, optimization, secure execution, and bug detection tools for application...
JaeWoong Chung, Michael Dalton, Hari Kannan, Chris...
113
Voted
DGO
2008
135views Education» more  DGO 2008»
15 years 4 months ago
Florida Public Hurricane Loss Model (FPHLM): research experience in system integration
The Florida Public Hurricane Loss Model (FPHLM) developed in the State of Florida offers an open, public and effective tool for the government to regulate the insurance ratemaking...
Shu-Ching Chen, Min Chen, Na Zhao, Shahid Hamid, K...
131
Voted
SIGSOFT
2008
ACM
16 years 3 months ago
Javert: fully automatic mining of general temporal properties from dynamic traces
Program specifications are important for many tasks during software design, development, and maintenance. Among these, temporal specifications are particularly useful. They expres...
Mark Gabel, Zhendong Su
148
Voted
CASC
2006
Springer
128views Mathematics» more  CASC 2006»
15 years 6 months ago
New Domains for Applied Quantifier Elimination
We address various aspects of our computer algebra-based computer logic system redlog. There are numerous examples in the literature for successful applications of redlog to practi...
Thomas Sturm