Sciweavers

4835 search results - page 647 / 967
» Refactoring Functional Programs
Sort
View
129
Voted
ICISS
2010
Springer
15 years 14 days ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
15 years 11 days ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
VSTTE
2010
Springer
15 years 11 days ago
Dafny Meets the Verification Benchmarks Challenge
A suite of verification benchmarks for software verification tools and techniques, presented at VSTTE 2008 [11], provides an initial catalogue of benchmark challenges for the Verif...
K. Rustan M. Leino, Rosemary Monahan
AI
2011
Springer
14 years 9 months ago
Expressive markets for donating to charities
When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as a bargaining chip to induce other parties interested in the charity to donate ...
Vincent Conitzer, Tuomas Sandholm
127
Voted
ICCV
2003
IEEE
16 years 4 months ago
View-invariant Alignment and Matching of Video Sequences
In this paper, we propose a novel method to establish temporal correspondence between the frames of two videos. 3D epipolar geometry is used to eliminate the distortion generated ...
Cen Rao, Alexei Gritai, Mubarak Shah, Tanveer Fath...