Sciweavers

2371 search results - page 116 / 475
» Using wearable computing solutions in real-world application...
Sort
View
169
Voted
SEKE
2010
Springer
15 years 3 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
121
Voted
IMSCCS
2007
IEEE
15 years 11 months ago
TOPSAW Sawing Optimization Analysis Using Grid Computing
TOPSAW program was developed by Dr. S. Chang and his team and has been successfully used in the replication of sawmill cutting to determine the optimal cutting pattern for a log t...
Ashwin Bommathanahalli, Maoyuan Xie, Zhifeng Yun, ...
ICTAI
1997
IEEE
15 years 8 months ago
Prime Implicant Computation Using Satisfiability Algorithms
The computation of prime implicants has several and significant applications in different areas, including Automated Reasoning, Non-Monotonic Reasoning, Electronic Design Automati...
Vasco M. Manquinho, Paulo F. Flores, João P...
APLAS
2005
ACM
15 years 10 months ago
Heterogeneous Fixed Points with Application to Points-To Analysis
Many situations can be modeled as solutions of systems of simultaneous equations. If the functions of these equations monotonically increase in all bound variables, then the existe...
Aditya Kanade, Uday P. Khedker, Amitabha Sanyal
SCN
2010
Springer
129views Communications» more  SCN 2010»
15 years 3 months ago
Improved Primitives for Secure Multiparty Integer Computation
We consider a collection of related multiparty computation protocols that provide core operations for secure integer and fixed-point computation. The higher-level protocols offer...
Octavian Catrina, Sebastiaan de Hoogh