Sciweavers

1629 search results - page 152 / 326
» Infeasible Code Detection
Sort
View
IH
2007
Springer
15 years 4 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
ESA
2005
Springer
162views Algorithms» more  ESA 2005»
15 years 3 months ago
Negative Cycle Detection Problem
In this paper, we will describe some heuristics that can be used to improve the runtime of a wide range of commonly used algorithms for the negative cycle detection problem signiï¬...
Chi-Him Wong, Yiu-Cheong Tam
RAID
2005
Springer
15 years 3 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
TCOM
2010
120views more  TCOM 2010»
14 years 8 months ago
Improved linear soft-input soft-output detection via soft feedback successive interference cancellation
—We propose an improved minimum mean square error (MMSE) vertical Bell Labs layered space-time (V-BLAST) detection technique, called a soft input, soft output, and soft feedback ...
Jun Won Choi, Andrew C. Singer, Jung Woo Lee, Nam ...
ISCI
2011
14 years 5 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni