Sciweavers

1794 search results - page 263 / 359
» Visualizing Memory Graphs
Sort
View
103
Voted
ISW
2004
Springer
15 years 7 months ago
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a si...
Mark Foster, Joseph N. Wilson, Shigang Chen
86
Voted
ICALP
2010
Springer
15 years 7 months ago
Streaming Algorithms for Independent Sets
We find “combinatorially optimal” (guaranteed by the degree-sequence alone) independent sets for graphs and hypergraps in linear space in the semi-streaming model. We also pr...
Bjarni V. Halldórsson, Magnús M. Hal...
VLSID
2000
IEEE
75views VLSI» more  VLSID 2000»
15 years 6 months ago
Timing Analysis with Implicitly Specified False Paths
We consider the problem of timing analysis in the presence of known false paths. The main difficulty in adaptation of classical breadth-first search to the problem is that at each...
Eugene Goldberg, Alexander Saldanha
ISSTA
2000
ACM
15 years 6 months ago
OMEN: A strategy for testing object-oriented software
This paper presents a strategy for structural testing of objectoriented software systems with possibly unknown clients and unknown information about invoked methods. By exploiting...
Amie L. Souter, Lori L. Pollock
ICCAD
1997
IEEE
86views Hardware» more  ICCAD 1997»
15 years 6 months ago
Micro-preemption synthesis: an enabling mechanism for multi-task VLSI systems
- Task preemption is a critical enabling mechanism in multi-task VLSI systems. On preemption, data in the register les must be preserved in order for the task to be resumed. This e...
Kyosun Kim, Ramesh Karri, Miodrag Potkonjak