Sciweavers

683 search results - page 19 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
EUROSYS
2006
ACM
14 years 4 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
SIAMREV
2010
110views more  SIAMREV 2010»
13 years 2 months ago
Complex Singularities and the Lorenz Attractor
The Lorenz attractor is one of the best known examples of applied mathematics. However, much of what is known about it is a result of numerical calculations and not of mathematica...
Divakar Viswanath, Sönmez Sahutoglu
SIGSOFT
2008
ACM
14 years 8 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
WSCG
2003
142views more  WSCG 2003»
13 years 8 months ago
Three-Dimensional Object Recognition: Statistical Approach
The design of a general purpose artificial vision system capable of recognizing arbitrarily complex threedimensional objects without human intervention is still a challenging task...
R. Abdul Salam, M. A. Rodrigues
AAAI
2007
13 years 9 months ago
Isometric Projection
Recently the problem of dimensionality reduction has received a lot of interests in many fields of information processing. We consider the case where data is sampled from a low d...
Deng Cai, Xiaofei He, Jiawei Han