Sciweavers

981 search results - page 182 / 197
» Symbolic pointer analysis
Sort
View
TWC
2008
113views more  TWC 2008»
13 years 8 months ago
PHY-layer Fairness in Amplify and Forward Cooperative Diversity Systems
We deal with the concept of physical-layer fairness in amplify and forward cooperative diversity systems, which reflects the need for equally allocating the consumed power among th...
Diomidis S. Michalopoulos, George K. Karagiannidis
AI
1999
Springer
13 years 8 months ago
Understanding Mechanical Motion: From Images to Behaviors
We present an algorithm for producing behavior descriptions of planar fixed axes mechanical motions from image sequences using a formal behavior language. The language, which cove...
Tzachi Dar, Leo Joskowicz, Ehud Rivlin
IS
1998
13 years 8 months ago
Information Modeling in the Time of the Revolution
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
John Mylopoulos
CCS
2010
ACM
13 years 7 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
SEKE
2010
Springer
13 years 7 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li