Sciweavers

2947 search results - page 529 / 590
» Analyzing Program Analyses
Sort
View
MSCS
2010
84views more  MSCS 2010»
14 years 9 months ago
Channel abstractions for network security
Abstractions for Network Security† MICH E L E B U G L I E S I, R I C C A R D O F O C A R D I Dipartimento di Informatica, Universit`a Ca’ Foscari, Venice. Received 6 October 20...
Michele Bugliesi, Riccardo Focardi
SAS
2010
Springer
141views Formal Methods» more  SAS 2010»
14 years 9 months ago
Statically Inferring Complex Heap, Array, and Numeric Invariants
We describe Deskcheck, a parametric static analyzer that is able to establish properties of programs that manipulate dynamically allocated memory, arrays, and integers. Deskcheck c...
Bill McCloskey, Thomas W. Reps, Mooly Sagiv
SAS
2010
Springer
143views Formal Methods» more  SAS 2010»
14 years 9 months ago
Points-to Analysis as a System of Linear Equations
The efficiency of a points-to analysis is critical for several compiler optimizations and transformations, and has attracted considerable research attention. Despite several advanc...
Rupesh Nasre, Ramaswamy Govindarajan
120
Voted
SEKE
2010
Springer
14 years 9 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
EMNLP
2010
14 years 9 months ago
Assessing Phrase-Based Translation Models with Oracle Decoding
Extant Statistical Machine Translation (SMT) systems are very complex softwares, which embed multiple layers of heuristics and embark very large numbers of numerical parameters. A...
Guillaume Wisniewski, Alexandre Allauzen, Fran&cce...