Sciweavers

67 search results - page 9 / 14
» Security metrics for source code structures
Sort
View
134
Voted
COMPSAC
2009
IEEE
15 years 8 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...
88
Voted
MICCAI
2003
Springer
16 years 2 months ago
A Statistically Based Surface Evolution Method for Medical Image Segmentation: Presentation and Validation
Abstract. In this paper we present a new algorithm for 3D medical image segmentation. The algorithm is fast, relatively simple to implement, and semi-automatic. It is based on mini...
Eric Pichon, Allen Tannenbaum, Ron Kikinis
131
Voted
APLAS
2010
ACM
15 years 1 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
104
Voted
PLDI
2009
ACM
15 years 8 months ago
Binary analysis for measurement and attribution of program performance
Modern programs frequently employ sophisticated modular designs. As a result, performance problems cannot be identified from costs attributed to routines in isolation; understand...
Nathan R. Tallent, John M. Mellor-Crummey, Michael...
94
Voted
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
15 years 7 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron