Sciweavers

83 search results - page 7 / 17
» Software Deployment, Past, Present and Future
Sort
View
ACSAC
2007
IEEE
14 years 1 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
DYNAMO
2000
87views more  DYNAMO 2000»
13 years 9 months ago
Overcoming the Challenges to Feedback-Directed Optimization
Feedback-directed optimization (FDO) is a general term used to describe any technique that alters a program's execution based on tendencies observed in its present or past ru...
Michael D. Smith
PASTE
2010
ACM
14 years 19 days ago
Opportunities for concurrent dynamic analysis with explicit inter-core communication
Multicore is now the dominant processor trend, and the number of cores is rapidly increasing. The paradigm shift to multicore forces the redesign of the software stack, which incl...
Jungwoo Ha, Stephen P. Crago
CISSE
2008
Springer
13 years 9 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
BMCBI
2007
131views more  BMCBI 2007»
13 years 7 months ago
ISHAPE: new rapid and accurate software for haplotyping
Background: We have developed a new haplotyping program based on the combination of an iterative multiallelic EM algorithm (IEM), bootstrap resampling and a pseudo Gibbs sampler. ...
Olivier Delaneau, Cédric Coulonges, Pierre-...