Sciweavers

388 search results - page 36 / 78
» Program Analysis Using Symbolic Ranges
Sort
View
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
14 years 9 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
MICAI
2000
Springer
15 years 1 months ago
Searching for a Solution to Program Verification=Equation Solving in CCS
Unique Fixpoint Induction, UFI, is a chief inference rule to prove the equivalence of recursive processes in CCS [7]. It plays a major role in the equational approach to verificati...
Raul Monroy, Alan Bundy, Ian Green
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 4 months ago
Optimal Double Correlation Filtering for Carrier Frequency Offset Estimation in MIMO OFDM
Abstract— A computationally efficient optimal double correlation (ODC) filter, which works on the fourth order statistics of received samples, is proposed for carrier frequency...
Patrick Ho Wang Fung, Chin Keong Ho
STTT
2008
95views more  STTT 2008»
14 years 9 months ago
FAST: acceleration from theory to practice
Abstract. Fast is a tool for the analysis of systems manipulating unbounded integer variables. We check safety properties by computing the reachability set of the system under stud...
Sébastien Bardin, Alain Finkel, Jér&...
ASPLOS
2006
ACM
15 years 3 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...