Sciweavers

2605 search results - page 18 / 521
» The many levels of CSCL
Sort
View
RAID
2009
Springer
14 years 3 months ago
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration
Abstract. Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures ...
Juan Caballero, Zhenkai Liang, Pongsin Poosankam, ...
FMCAD
2007
Springer
14 years 2 months ago
Lifting Propositional Interpolants to the Word-Level
— Craig interpolants are often used to approximate inductive invariants of transition systems. Arithmetic relationships between numeric variables require word-level interpolants,...
Daniel Kroening, Georg Weissenbacher
TACAS
2007
Springer
103views Algorithms» more  TACAS 2007»
14 years 2 months ago
A Reachability Predicate for Analyzing Low-Level Software
Reasoning about heap-allocated data structures such as linked lists and arrays is challenging. The reachability predicate has proved to be useful for reasoning about the heap in ty...
Shaunak Chatterjee, Shuvendu K. Lahiri, Shaz Qadee...
JCDL
2006
ACM
139views Education» more  JCDL 2006»
14 years 2 months ago
Document level interoperability for collection creators
Digital library interoperability for both documents and metadata is a critical and complex issue. Although many relevant standards have been developed, and continue to evolve, in ...
David Bainbridge, Kaun Yu (Jeffrey) Ke, Ian H. Wit...
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
14 years 25 days ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández