Sciweavers

981 search results - page 182 / 197
» Symbolic pointer analysis
Sort
View
96
Voted
TWC
2008
113views more  TWC 2008»
15 years 7 days ago
PHY-layer Fairness in Amplify and Forward Cooperative Diversity Systems
We deal with the concept of physical-layer fairness in amplify and forward cooperative diversity systems, which reflects the need for equally allocating the consumed power among th...
Diomidis S. Michalopoulos, George K. Karagiannidis
AI
1999
Springer
15 years 1 days ago
Understanding Mechanical Motion: From Images to Behaviors
We present an algorithm for producing behavior descriptions of planar fixed axes mechanical motions from image sequences using a formal behavior language. The language, which cove...
Tzachi Dar, Leo Joskowicz, Ehud Rivlin
115
Voted
IS
1998
15 years 22 hour ago
Information Modeling in the Time of the Revolution
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
John Mylopoulos
95
Voted
CCS
2010
ACM
14 years 11 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
128
Voted
SEKE
2010
Springer
14 years 10 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li