Sciweavers

1222 search results - page 212 / 245
» Verifying a File System Implementation
Sort
View
SAC
2010
ACM
15 years 6 months ago
Dual analysis for proving safety and finding bugs
Program bugs remain a major challenge for software developers and various tools have been proposed to help with their localization and elimination. Most present-day tools are base...
Corneliu Popeea, Wei-Ngan Chin
HOST
2009
IEEE
15 years 6 months ago
Detecting Trojan Circuit Attacks
Abstract—Rapid advances in integrated circuit (IC) development predicted by Moore’s Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries ...
Gedare Bloom, Bhagirath Narahari, Rahul Simha
ECMDAFA
2009
Springer
98views Hardware» more  ECMDAFA 2009»
15 years 6 months ago
A Language-Theoretic View on Guidelines and Consistency Rules of UML
Abstract. Guidelines and consistency rules of UML are used to control the degrees of freedom provided by the language to prevent faults. Guidelines are used in specific domains (e...
Zhe Chen, Gilles Motet
ACSAC
2008
IEEE
15 years 6 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...
CRV
2008
IEEE
192views Robotics» more  CRV 2008»
15 years 6 months ago
Realtime Visualization of Monocular Data for 3D Reconstruction
Methods for reconstructing photorealistic 3D graphics models from images or video are appealing applications of computer vision. Such methods rely on good input image data, but th...
Adam Rachmielowski, Neil Birkbeck, Martin Jäg...