Sciweavers

890 search results - page 63 / 178
» Programming language methods in computer security
Sort
View
80
Voted
AINA
2009
IEEE
15 years 5 months ago
Layer-Based Dome Contents Creation Using Scenario Description Language
—In recent years, dome display has become popular, and it is desired to establish a method to create dome image contents easily. In this study, psychophysical experiment was cond...
Tetsuro Ogi, Daisuke Furuyama, Tetsuro Fujise
99
Voted
ICTAI
2006
IEEE
15 years 6 months ago
Graph Grammar Induction on Structural Data for Visual Programming
Computer programs that can be expressed in two or more dimensions are typically called visual programs. The underlying theories of visual programming languages involve graph gramm...
Keven Ates, Jacek P. Kukluk, Lawrence B. Holder, D...
98
Voted
GI
2009
Springer
15 years 5 months ago
Reasoning about Contextual Equivalence: From Untyped to Polymorphically Typed Calculi
: This paper describes a syntactical method for contextual equivalence in polymorphically typed lambda-calculi. Our specific calculus has letrec as cyclic let, data constructors, ...
David Sabel, Manfred Schmidt-Schauß, Frederi...
113
Voted
ACTAC
2002
102views more  ACTAC 2002»
15 years 10 days ago
Handling Pointers and Unstructured Statements in the Forward Computed Dynamic Slice Algorithm
Different program slicing methods are used for debugging, testing, reverse engineering and maintenance. Slicing algorithms can be classified as a static slicing or dynamic slicing...
Csaba Faragó, Tamás Gergely
CCS
2007
ACM
15 years 4 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...