Sciweavers

1821 search results - page 279 / 365
» Security-Aware Program Transformations
Sort
View
101
Voted
CC
2001
Springer
176views System Software» more  CC 2001»
15 years 5 months ago
A Framework for Optimizing Java Using Attributes
Abstract. This paper presents a framework for supporting the optimization of Java programs using attributes in Java class files. We show how class file attributes may be used to ...
Patrice Pominville, Feng Qian, Raja Vallée-...
115
Voted
CADE
2000
Springer
15 years 5 months ago
Machine Instruction Syntax and Semantics in Higher Order Logic
Abstract. Proof-carrying code and other applications in computer security require machine-checkable proofs of properties of machine-language programs. These in turn require axioms ...
Neophytos G. Michael, Andrew W. Appel
AGP
1999
IEEE
15 years 5 months ago
The Relative Complement Problem for Higher-Order Patterns
We address the problem of complementing higher-order patterns without repetitions of free variables. Differently from the first-order case, the complement of a pattern cannot, in ...
Alberto Momigliano, Frank Pfenning
131
Voted
WETICE
1999
IEEE
15 years 5 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
118
Voted
ICCV
1998
IEEE
15 years 5 months ago
A Maximum-Flow Formulation of the N-Camera Stereo Correspondence Problem
This paper describes a new algorithm for solving the N-camera stereo correspondence problem by transforming it into a maximum- ow problem. Once solved, the minimum-cut associated ...
Sébastien Roy, Ingemar J. Cox