Sciweavers

8810 search results - page 1595 / 1762
» Openness
Sort
View
134
Voted
CAV
2010
Springer
225views Hardware» more  CAV 2010»
15 years 8 months ago
Merit: An Interpolating Model-Checker
Abstract. We present the tool MERIT, a CEGAR model-checker for safety propf counter-systems, which sits in the Lazy Abstraction with Interpolants (LAWI) framework. LAWI is parametr...
Nicolas Caniart
154
Voted
ACSAC
2004
IEEE
15 years 8 months ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh
ACSAC
2004
IEEE
15 years 8 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
CBMS
2004
IEEE
15 years 8 months ago
Real-Time Matching of Angiographies with In Situ Heart Image Sequences
Coronary angiography has become an important tool in modern medicine by providing an additional modality for heart disease diagnostics. Even though the recorded images (or image s...
Istvan Nagy, Alois Knoll, Robert Bauernschmitt, Ev...
CCGRID
2004
IEEE
15 years 8 months ago
Protection mechanisms for application service hosting platforms
The Application Service Hosting Platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared highperformance infrastructur...
Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann
« Prev « First page 1595 / 1762 Last » Next »