Sciweavers

78 search results - page 13 / 16
» sp 2010
Sort
View
106
Voted
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 3 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
MOR
2010
118views more  MOR 2010»
14 years 10 months ago
Strategyproof Approximation of the Minimax on Networks
We consider the problem of locating a facility on a network, represented by a graph. A set of strategic agents have different ideal locations for the facility; the cost of an age...
Noga Alon, Michal Feldman, Ariel D. Procaccia, Mos...
ACSAC
2010
IEEE
14 years 9 months ago
A framework for testing hardware-software security architectures
New security architectures are difficult to prototype and test at the design stage. Fine-grained monitoring of the interactions between hardware, the operating system, and applica...
Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-...
TWC
2010
14 years 6 months ago
Near-capacity iterative decoding of binary self-concatenated codes using soft decision demapping and 3-D EXIT charts
In this paper 3-D Extrinsic Information Transfer (EXIT) charts are used to design binary Self-Concatenated Convolutional Codes employing Iterative Decoding (SECCC-ID), exchanging e...
Muhammad Fasih Uddin Butt, Raja Ali Riaz, Soon Xin...
IHI
2010
136views Healthcare» more  IHI 2010»
14 years 6 months ago
Modeling and estimating the spatial distribution of healthcare workers
This paper describes a spatial model for healthcare workers' location in a large hospital facility. Such models have many applications in healthcare, such as supporting timea...
Donald Ephraim Curtis, Christopher S. Hlady, Srira...