Sciweavers

786 search results - page 62 / 158
» A static theory of promises
Sort
View
DIMVA
2006
14 years 11 months ago
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs
Incomplete or improper input validation is one of the major sources of security bugs in programs. While traditional approaches often focus on detecting string related buffer overfl...
Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Kar...
FLAIRS
2000
14 years 11 months ago
Domain Semantics for Agent-Oriented Programming
This paper describes a novel semantic framework for an agent architecture. Drawing on Shoham's work on AGENT0 (Shoham 1993), we replace Shoham's modal logic semantics wi...
Roger Norton, S. Rebecca Thomas
SEC
2000
14 years 11 months ago
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses
The theory of computer viruses has been studied by several authors, though there is no systematic theoretical study up to now. The long time open question in this area is as follo...
Yongge Wang
HUC
2010
Springer
14 years 11 months ago
Goal-driven opportunistic sensing
Opportunistic activity and context recognition systems do not presume a static sensor infrastructure that is defined at the design time of a system. They also do not have a fixed ...
Marc Kurz
AUTOMATICA
2006
64views more  AUTOMATICA 2006»
14 years 10 months ago
On stability of second-order quasi-polynomials with a single delay
In this note the stability of a second-order quasi-polynomial with a single delay is studied. Although there is a vast literature on this problem, most available solutions are lim...
Efim Malakhovski, Leonid Mirkin