Sciweavers

5843 search results - page 14 / 1169
» Software Security in Practice
Sort
View
112
Voted
AGENTS
2001
Springer
15 years 8 months ago
Specifying agent behavior as concurrent tasks
Software agents are currently the subject of much research in many interrelated fields. Unfortunately, there has not been enough emphasis on defining the techniques required to bu...
Scott A. DeLoach
160
Voted
PASTE
2010
ACM
15 years 5 months ago
Null dereference analysis in practice
Many analysis techniques have been proposed to determine when a potentially null value may be dereferenced. But we have observed in practice that not every potential null derefere...
Nathaniel Ayewah, William Pugh
112
Voted
SP
2003
IEEE
15 years 9 months ago
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards
Noam Kogan, Yuval Shavitt, Avishai Wool