Sciweavers

506 search results - page 63 / 102
» Where Is the Value in a Program Verifier
Sort
View
146
Voted
ICNP
2006
IEEE
15 years 10 months ago
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
— File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers ...
Qiming Li, Dah-Ming Chiu, John C. S. Lui
170
Voted
CORR
2002
Springer
114views Education» more  CORR 2002»
15 years 3 months ago
Offline Specialisation in Prolog Using a Hand-Written Compiler Generator
The so called "cogen approach" to program specialisation, writing a compiler generator instead of a specialiser, has been used with considerable success in partial evalu...
Michael Leuschel, Jesper Jørgensen, Wim Van...
126
Voted
AI
2006
Springer
15 years 4 months ago
Is real-valued minimax pathological?
Deeper searches in game-playing programs relying on the minimax principle generally produce better results. Theoretical analyses, however, suggest that in many cases minimaxing am...
Mitja Lustrek, Matjaz Gams, Ivan Bratko
137
Voted
WWW
2005
ACM
16 years 4 months ago
Web service interfaces
We present a language for specifying web service interfaces. A web service interface puts three kinds of constraints on the users of the service. First, the interface specifies th...
Dirk Beyer, Arindam Chakrabarti, Thomas A. Henzing...
SIGSOFT
2004
ACM
16 years 4 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek