Sciweavers

3481 search results - page 550 / 697
» Higher-Order Logic Programming as Constraint Logic Programmi...
Sort
View
172
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
126
Voted
WCRE
2007
IEEE
15 years 9 months ago
Parametric Process Model Inference
Legacy applications can be difficult and time-consuming to understand and update due to the lack of modern abstraction mechanisms in legacy languages, as well as the gradual dete...
Saurabh Sinha, G. Ramalingam, Raghavan Komondoor
CCS
2005
ACM
15 years 9 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
119
Voted
PPDP
2005
Springer
15 years 9 months ago
A new calculus of contexts
We study contexts (terms with holes) by proposing a ‘λcalculus with holes’. It is very expressive and can encode programming constructs apparently unrelated to contexts, incl...
Murdoch Gabbay
104
Voted
ECAI
2004
Springer
15 years 8 months ago
Agent Planning, Negotiation and Control of Operation
Abstract. This paper presents a framework that integrates three aspects of agency: planning, for proactive behaviour, negotiation, for social behaviour and resource achievement, an...
Antonis C. Kakas, Paolo Torroni, Neophytos Demetri...