Control flow analysis

Results: 217



#Item
41Networks / Graph theory / Network theory / Dynamic programming / Partially observable Markov decision process / Stochastic control / Centrality / Social network analysis / Tree / Flow network

Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty Amulya Yadav, Hau Chan1 , Albert Jiang1 , Haifeng Xu, Eric Rice, Milind Tambe University of Southern California, Los Angele

Add to Reading List

Source URL: teamcore.usc.edu

Language: English - Date: 2016-02-11 22:17:39
42Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
43

XXII FLUID MECHANICS CONFERENCE Słok near Bełchatów city, 11-14 September 2016 Analysis of unsteady flow forces acting on the thermo-well in a steam turbine control stage J Badur, S Kornet, D Sławiński and P Ziółk

Add to Reading List

Source URL: www.kkmp2016.pwr.edu.pl

Language: English - Date: 2016-05-06 18:01:43
    44Computing / Software engineering / Computer programming / Compiler construction / Control flow / Obfuscation / Source code / Programming language implementation / Opaque predicate / Control flow graph / Data-flow analysis / Exception handling

    Control Flow Obfuscation with Information Flow Tracking∗ Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang Parallel Processing Institute Fudan University

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2012-01-05 23:24:59
    45Lambda calculus / Computability theory / Theoretical computer science / Control flow analysis / Pointer / Unification / Closure / Lambda calculus definition / Lambda lifting

    Control-Flow Analysis of Dynamic Languages via Pointer Analysis Steven Lyde William E. Byrd

    Add to Reading List

    Source URL: matt.might.net

    Language: English
    46Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

    Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

    Add to Reading List

    Source URL: www.eecs.berkeley.edu

    Language: English - Date: 2013-05-16 23:27:09
    47Crime prevention / Cryptography / Information governance / National security / Computer security / Covert channel / Information flow / Program slicing / Mandatory access control / Alloy Analyzer / Domain-specific language / Information security

    A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

    Add to Reading List

    Source URL: cisr.nps.edu

    Language: English - Date: 2008-08-18 13:41:06
    48

    Exact Flow Analysis by Higher-Order Model Checking Yoshihiro Tobita, Takeshi Tsukada, and Naoki Kobayashi Tohoku University, Japan Abstract. We propose a novel control flow analysis for higher-order

    Add to Reading List

    Source URL: www-kb.is.s.u-tokyo.ac.jp

    Language: English - Date: 2012-07-04 02:09:58
      49

      Exact Flow Analysis by Higher-Order Model Checking Yoshihiro Tobita, Takeshi Tsukada, and Naoki Kobayashi Tohoku University, Japan Abstract. We propose a novel control flow analysis for higher-order

      Add to Reading List

      Source URL: www-kb.is.s.u-tokyo.ac.jp

      Language: English - Date: 2012-04-23 23:58:15
        50

        Pushdown Flow Analysis of First-Class Control Dimitris Vardoulakis Olin Shivers Northeastern University

        Add to Reading List

        Source URL: dimvar.github.io

        Language: English - Date: 2015-03-02 02:45:18
          UPDATE