Sciweavers

1629 search results - page 141 / 326
» Infeasible Code Detection
Sort
View
ICST
2009
IEEE
15 years 4 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
DAC
2008
ACM
14 years 11 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
SPAA
1997
ACM
15 years 1 months ago
Efficient Detection of Determinacy Races in Cilk Programs
A parallel multithreaded program that is ostensibly deterministic may nevertheless behave nondeterministically due to bugs in the code. These bugs are called determinacy races, an...
Mingdong Feng, Charles E. Leiserson
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 4 months ago
Sphere Decoder for a MIMO Multi-User MC-CDMA Uplink in Time-Varying Channels
— We focus on iterative detection for the uplink of a multi-carrier (MC) code division multiple access (CDMA) system based on orthogonal frequency division multiplexing (OFDM). T...
Charlotte Dumard, Thomas Zemen
ECOOPWEXCEPTION
2006
Springer
15 years 1 months ago
Failure Handling in a Network-Transparent Distributed Programming Language
Abstract. This paper shows that asynchronous fault detection is a practical way to reflect partial failure in a network-transparent distributed programming language. In the network...
Raphaël Collet, Peter Van Roy