Sciweavers

7 search results - page 2 / 2
» Symbolic and Analytic Techniques for Resource Analysis of Ja...
Sort
View
SEKE
2010
Springer
13 years 3 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
TWC
2008
169views more  TWC 2008»
13 years 4 months ago
Antenna subset diversity with non-ideal channel estimation
In modern wireless systems employing diversity techniques, combining all the available diversity branches may not be feasible due to complexity and resource constraints. To allevia...
Wesley M. Gifford, Moe Z. Win, Marco Chiani