Sciweavers

981 search results - page 182 / 197
» Symbolic pointer analysis
Sort
View
111
Voted
TWC
2008
113views more  TWC 2008»
15 years 2 months ago
PHY-layer Fairness in Amplify and Forward Cooperative Diversity Systems
We deal with the concept of physical-layer fairness in amplify and forward cooperative diversity systems, which reflects the need for equally allocating the consumed power among th...
Diomidis S. Michalopoulos, George K. Karagiannidis
110
Voted
AI
1999
Springer
15 years 1 months ago
Understanding Mechanical Motion: From Images to Behaviors
We present an algorithm for producing behavior descriptions of planar fixed axes mechanical motions from image sequences using a formal behavior language. The language, which cove...
Tzachi Dar, Leo Joskowicz, Ehud Rivlin
IS
1998
15 years 1 months ago
Information Modeling in the Time of the Revolution
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
John Mylopoulos
115
Voted
CCS
2010
ACM
15 years 1 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
SEKE
2010
Springer
15 years 20 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li