Control flow graph

Results: 74



#Item
11Networks / Graph theory / Network theory / Dynamic programming / Partially observable Markov decision process / Stochastic control / Centrality / Social network analysis / Tree / Flow network

Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty Amulya Yadav, Hau Chan1 , Albert Jiang1 , Haifeng Xu, Eric Rice, Milind Tambe University of Southern California, Los Angele

Add to Reading List

Source URL: teamcore.usc.edu

Language: English - Date: 2016-02-11 22:17:39
12Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
13Graph theory / Computing / Mathematics / Wireless networking / Network theory / Wireless sensor network / Routing algorithms / Edsger W. Dijkstra / Topology control / Flow network / Wireless ad hoc network / Tree

Interference Arises at the Receiver Martin Fussen, Roger Wattenhofer, Aaron Zollinger {mafussen@student, , }.ethz.ch Computer Engineering and Networks Laboratory ETH Zurich, Switzerland

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:28
14Computing / Software engineering / Computer programming / Compiler construction / Control flow / Obfuscation / Source code / Programming language implementation / Opaque predicate / Control flow graph / Data-flow analysis / Exception handling

Control Flow Obfuscation with Information Flow Tracking∗ Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang Parallel Processing Institute Fudan University

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:24:59
15Computer programming / Software engineering / Computing / Computer security / Control-flow integrity / Code reuse / Return-oriented programming / Subroutine / Control flow / Flow graph / Pointer

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, Antonio Barresi, Thomas R. Gross ETH Zürich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
16Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-05-16 23:27:09
17Computer programming / Loop optimization / Control flow graph / Loop unwinding / Control flow / For loop / Infinite loop / Loop unswitching / Induction variable / Compiler optimizations / Computing / Software engineering

A New Loop Optimizer for GCC Zdenˇek Dvoˇrák SuSE Labs , http://atrey.karlin.mff.cuni.cz/˜rakdver/ Abstract

Add to Reading List

Source URL: gcc.cybermirror.org

Language: English - Date: 2004-08-29 18:00:00
18Graph theory / Routing algorithms / Search algorithms / Game artificial intelligence / Command and control / Global Positioning System / A* search algorithm / Traffic flow / Shortest path problem / Mathematics / Combinatorial optimization / Technology

Map-Matching for Low-Sampling-Rate GPS Trajectories Yin Lou Chengyang Zhang Yu Zheng

Add to Reading List

Source URL: www.cse.unt.edu

Language: English - Date: 2013-08-12 14:20:54
19

The Machine-SUIF Control Flow Graph Library Release versionGlenn Holloway and Michael D. Smith {holloway,smith}@eecs.harvard.edu Division of Engineering and Applied Sciences Harvard University

Add to Reading List

Source URL: www.eecs.harvard.edu

- Date: 2002-07-15 23:52:03
    20Physical Unclonable Function / Randomness / Analysis of algorithms / Challenge-response authentication / IP / Control flow graph / PUF / Pseudorandomness / Copy protection / Cryptography / Applied mathematics / Theoretical computer science

    A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2012-06-05 18:18:00
    UPDATE