Sciweavers

3951 search results - page 695 / 791
» Automatic amortized analysis
Sort
View
SEKE
2010
Springer
14 years 10 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
TMI
2010
182views more  TMI 2010»
14 years 10 months ago
A Bayesian Mixture Approach to Modeling Spatial Activation Patterns in Multisite fMRI Data
Abstract—We propose a probabilistic model for analyzing spatial activation patterns in multiple functional magnetic resonance imaging (fMRI) activation images such as repeated ob...
Seyoung Kim, Padhraic Smyth, Hal S. Stern
TSE
2010
125views more  TSE 2010»
14 years 10 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin
TSE
2010
148views more  TSE 2010»
14 years 10 months ago
Program Behavior Discovery and Verification: A Graph Grammar Approach
—Discovering program behaviors and functionalities can ease program comprehension and verification. Existing program analysis approaches have used text mining algorithms to infer...
Chunying Zhao, Jun Kong, Kang Zhang
VTC
2010
IEEE
163views Communications» more  VTC 2010»
14 years 10 months ago
An ARQ Mechanism with Rate Control for Two-Hop Relaying Systems
— Wireless multi-hop relaying has been attracting considerable attention as a promising technique for future communication systems. The multi-hop relaying technique has many bene...
Soo-Yong Jeon, Dong-Ho Cho