Sciweavers

78 search results - page 13 / 16
» sp 2010
Sort
View
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
14 years 1 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
MOR
2010
118views more  MOR 2010»
13 years 8 months ago
Strategyproof Approximation of the Minimax on Networks
We consider the problem of locating a facility on a network, represented by a graph. A set of strategic agents have different ideal locations for the facility; the cost of an age...
Noga Alon, Michal Feldman, Ariel D. Procaccia, Mos...
ACSAC
2010
IEEE
13 years 7 months ago
A framework for testing hardware-software security architectures
New security architectures are difficult to prototype and test at the design stage. Fine-grained monitoring of the interactions between hardware, the operating system, and applica...
Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-...
TWC
2010
13 years 4 months ago
Near-capacity iterative decoding of binary self-concatenated codes using soft decision demapping and 3-D EXIT charts
In this paper 3-D Extrinsic Information Transfer (EXIT) charts are used to design binary Self-Concatenated Convolutional Codes employing Iterative Decoding (SECCC-ID), exchanging e...
Muhammad Fasih Uddin Butt, Raja Ali Riaz, Soon Xin...
IHI
2010
136views Healthcare» more  IHI 2010»
13 years 4 months ago
Modeling and estimating the spatial distribution of healthcare workers
This paper describes a spatial model for healthcare workers' location in a large hospital facility. Such models have many applications in healthcare, such as supporting timea...
Donald Ephraim Curtis, Christopher S. Hlady, Srira...