Sciweavers

2957 search results - page 42 / 592
» Code analysis and CS-XML
Sort
View
INFOCOM
1996
IEEE
15 years 3 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
CORR
2008
Springer
137views Education» more  CORR 2008»
14 years 11 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
VMCAI
2005
Springer
15 years 5 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
FORTE
2004
15 years 1 months ago
Model-Checking Plus Testing: From Software Architecture Analysis to Code Testing
Software Model-Checking and Testing are some of the most used techniques to analyze software systems and identify hidden faults. While software model-checking allows for an exhaust...
Antonio Bucchiarone, Henry Muccini, Patrizio Pelli...
ICIP
2003
IEEE
16 years 1 months ago
Improved H.264/AVC coding using texture analysis and synthesis
We assume that the textures in a video scene can be classified into two categories: textures with unimportant subjective details and the remainder. We utilize this assumption for ...
Patrick Ndjiki-Nya, Bela Makai, Gabi Blattermann, ...