Sciweavers

28 search results - page 2 / 6
» Comprehensive shellcode detection using runtime heuristics
Sort
View
ICSM
2005
IEEE
13 years 10 months ago
Measurement and Quality in Object-Oriented Design
In order to support the maintenance of object-oriented software systems, the quality of their design must be evaluated using adequate quantification means. In spite of the curren...
Radu Marinescu
ESA
2005
Springer
162views Algorithms» more  ESA 2005»
13 years 10 months ago
Negative Cycle Detection Problem
In this paper, we will describe some heuristics that can be used to improve the runtime of a wide range of commonly used algorithms for the negative cycle detection problem signi...
Chi-Him Wong, Yiu-Cheong Tam
ISCA
2012
IEEE
248views Hardware» more  ISCA 2012»
11 years 7 months ago
Watchdog: Hardware for safe and secure manual memory management and full memory safety
Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable secu...
Santosh Nagarakatte, Milo M. K. Martin, Steve Zdan...
INFOCOM
2003
IEEE
13 years 10 months ago
Topology Inference in the Presence of Anonymous Routers
— Many topology discovery systems rely on traceroute to discover path information in public networks. However, for some routers, traceroute detects their existence but not their ...
Bin Yao, Ramesh Viswanathan, Fangzhe Chang, Dan G....
AINA
2007
IEEE
13 years 9 months ago
Conflict Detection and Resolution in Context-Aware Authorization
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...