Sciweavers

1629 search results - page 212 / 326
» Infeasible Code Detection
Sort
View
COMPSAC
2008
IEEE
15 years 8 months ago
Ontology Model-Based Static Analysis on Java Programs
1 Typical enterprise and military software systems consist of millions of lines of code with complicated dependence on library abstractions. Manually debugging these codes imposes ...
Lian Yu, Jun Zhou, Yue Yi, Ping Li, Qianxiang Wang
121
Voted
ACMSE
2006
ACM
15 years 7 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
TCOM
2008
94views more  TCOM 2008»
15 years 1 months ago
Transmit power allocation for successive interference cancellation in multicode MIMO systems
Multiple-input multiple-output (MIMO) system with multicode transmission can provide high speed data services by transmitting independent parallel substreams from multiple antennas...
Chang Soon Park, Kwang Bok Lee
135
Voted
CCS
2006
ACM
15 years 5 months ago
EXE: automatically generating inputs of death
This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input,...
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, ...

Publication
233views
16 years 12 months ago
Error Characteristics of Fiber Distributed Data Interface (FDDI)
An analysis is made of the impact of various design decisions on the error detection capability of the fiber distributed data interface (FDDI), a 100-Mb/s fiber-optic LAN stardard ...
R. Jain