Sciweavers

9841 search results - page 136 / 1969
» Distributed Value Functions
Sort
View
ICISS
2010
Springer
14 years 8 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
POPL
2004
ACM
15 years 10 months ago
Global value numbering using random interpretation
We present a polynomial time randomized algorithm for global value numbering. Our algorithm is complete when conditionals are treated as non-deterministic and all operators are tr...
Sumit Gulwani, George C. Necula
CORR
2006
Springer
86views Education» more  CORR 2006»
14 years 10 months ago
Maximum Entropy MIMO Wireless Channel Models
In this contribution, models of wireless channels are derived from the maximum entropy principle, for several cases where only limited information about the propagation environmen...
Maxime Guillaud, Mérouane Debbah, Aris L. M...
POPL
2001
ACM
15 years 10 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
DGO
2004
102views Education» more  DGO 2004»
14 years 11 months ago
A Web Query System for Heterogeneous Government Data
This paper describes a Web-based query system for semantically heterogeneous government-produced data. Geospatial Web-based information systems and portals are currently being dev...
Nancy Wiegand, Naijun Zhou, Isabel F. Cruz, Willia...