Sciweavers

8177 search results - page 548 / 1636
» Detecting System Emulators
Sort
View
USS
2010
15 years 3 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
ISSTA
2012
ACM
13 years 7 months ago
Residual investigation: predictive and precise bug detection
We introduce the concept of “residual investigation” for program analysis. A residual investigation is a dynamic check installed as a result of running a static analysis that ...
Kaituo Li, Christoph Reichenbach, Christoph Csalln...
SIGSOFT
2003
ACM
16 years 5 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
PLDI
2010
ACM
16 years 2 months ago
Breadcrumbs: Efficient Context Sensitivity for Dynamic Bug Detection Analyses
Calling context--the set of active methods on the stack--is critical for understanding the dynamic behavior of large programs. Dynamic program analysis tools, however, are almost ...
Michael D. Bond, Graham Z. Baker, Samuel Z. Guyer
ICC
2008
IEEE
120views Communications» more  ICC 2008»
15 years 11 months ago
Near-Optimum Soft-Output Ant-Colony-Optimization Based Multiuser Detection for the DS-CDMA Uplink
— In this contribution, a novel soft-output Ant Colony Optimization (ACO) based Multi-User Detector (MUD) is proposed for the synchronous Direct-Sequence Code-DivisionMultiple-Ac...
Chong Xu, Lie-Liang Yang, Robert G. Maunder, Lajos...