Sciweavers

976 search results - page 172 / 196
» Approach to a Theory of Software Evolution
Sort
View
72
Voted
CCS
2009
ACM
15 years 4 months ago
English shellcode
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an att...
Joshua Mason, Sam Small, Fabian Monrose, Greg MacM...
89
Voted
BMCBI
2011
14 years 1 months ago
FFCA: a feasibility-based method for flux coupling analysis of metabolic networks
Background: Flux coupling analysis (FCA) is a useful method for finding dependencies between fluxes of a metabolic network at steady-state. FCA classifies reactions into subsets (...
László Dávid, Sayed-Amir Mara...
PEPM
2007
ACM
16 years 7 months ago
Concoqtion: Indexed types now!
programming languages community is vigorously pursuing ways to incorporate F!-style indexed types into programming languages. This paper advocates Concoqtion, a practical approach ...
Emir Pasalic, Jeremy G. Siek, Seth Fogarty, Walid ...
CADE
2009
Springer
15 years 10 months ago
Solving Non-linear Polynomial Arithmetic via SAT Modulo Linear Arithmetic
Abstract. Polynomial constraint-solving plays a prominent role in several areas of engineering and software verification. In particular, polynomial constraint solving has a long an...
Albert Rubio, Cristina Borralleras, Enric Rodr&iac...
EUROSEC
2010
ACM
15 years 4 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...