Sciweavers

3107 search results - page 318 / 622
» Error-Correcting Source Code
Sort
View
ICSM
2003
IEEE
15 years 9 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
CCR
1998
137views more  CCR 1998»
15 years 3 months ago
Experience with control mechanisms for packet video in the internet
The single class best effort service available in the current Internet does not provide the guarantees, typically expressed in terms of minimum bandwidth and/or maximum delay or l...
Jean-Chrysostome Bolot, Thierry Turletti
ICIP
2010
IEEE
15 years 1 months ago
Multi-stream partitioning and parity rate allocation for scalable IPTV delivery
We address the joint problem of clustering heterogenous clients and allocating scalable video source rate and FEC redundancy in IPTV systems. We propose a streaming solution that ...
Jacob Chakareski, Pascal Frossard
117
Voted
DCC
2008
IEEE
16 years 3 months ago
High-Resolution Functional Quantization
Suppose a function of N real source variables XN 1 = (X1, X2, . . . , XN ) is desired at a destination constrained to receive a limited number of bits. If the result of evaluating...
Vinith Misra, Vivek K. Goyal, Lav R. Varshney
ACSAC
2007
IEEE
15 years 10 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...