41![A Static Analyzer for Large Safety-Critical Software (Extended Abstract) Bruno Blanchet ∗ § Laurent Mauborgne § Patrick Cousot § A Static Analyzer for Large Safety-Critical Software (Extended Abstract) Bruno Blanchet ∗ § Laurent Mauborgne § Patrick Cousot §](https://www.pdfsearch.io/img/dd58833a90c4721d559322c16004882d.jpg) | Add to Reading ListSource URL: www-verimag.imag.frLanguage: English - Date: 2007-10-18 09:44:48
|
---|
42![Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting Kangjie Lu1 , Zhichun Li2 , Vasileios P. Kemerlis3 , Zhenyu Wu2 , Long Lu4 , Cong Zheng1, Zhiyun Qian5 , Wenke L Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting Kangjie Lu1 , Zhichun Li2 , Vasileios P. Kemerlis3 , Zhenyu Wu2 , Long Lu4 , Cong Zheng1, Zhiyun Qian5 , Wenke L](https://www.pdfsearch.io/img/debac0bf2d411135d36c6c602642b3ff.jpg) | Add to Reading ListSource URL: wenke.gtisc.gatech.eduLanguage: English - Date: 2014-12-07 22:14:50
|
---|
43![Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres](https://www.pdfsearch.io/img/ceffd22fa968e44ceefb2d46cc77f958.jpg) | Add to Reading ListSource URL: www.eecs.berkeley.eduLanguage: English - Date: 2013-05-16 23:27:09
|
---|
44![Exploratory analysis of pedestrian flow characteristics in mobility hubs using trajectory data Marija Nikolić, Transp - OR, EPFL Bilal Farooq, Transp - OR, EPFL Michel Bierlaire, Transp - OR, EPFL Exploratory analysis of pedestrian flow characteristics in mobility hubs using trajectory data Marija Nikolić, Transp - OR, EPFL Bilal Farooq, Transp - OR, EPFL Michel Bierlaire, Transp - OR, EPFL](https://www.pdfsearch.io/img/df8c0266ed1b8acb3f2b5b8802e375c5.jpg) | Add to Reading ListSource URL: www.strc.chLanguage: English - Date: 2013-05-17 10:59:13
|
---|
45![Sound and Precise Analysis of Parallel Programs through Schedule Specialization Jingyue Wu Yang Tang Sound and Precise Analysis of Parallel Programs through Schedule Specialization Jingyue Wu Yang Tang](https://www.pdfsearch.io/img/71e1bb503c44e6d6def9b4f403532d53.jpg) | Add to Reading ListSource URL: www.cs.columbia.eduLanguage: English - Date: 2016-01-23 22:11:33
|
---|
46![Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan](https://www.pdfsearch.io/img/8fff53def233c8623d78d629a7349a04.jpg) | Add to Reading ListSource URL: ieee-security.orgLanguage: English - Date: 2015-05-20 23:58:55
|
---|
47![Spatial and Temporal Analysis of Congestion in Urban Transportation Networks Yuxuan Ji Nikolas Geroliminis STRC 2010 Spatial and Temporal Analysis of Congestion in Urban Transportation Networks Yuxuan Ji Nikolas Geroliminis STRC 2010](https://www.pdfsearch.io/img/ae614618309ced92ff2fe225c410a190.jpg) | Add to Reading ListSource URL: www.strc.chLanguage: English - Date: 2010-08-28 08:23:41
|
---|
48![A DEMAND-DRIVEN APPROACH FOR EFFICIENT INTERPROCEDURAL DATA FLOW ANALYSIS by Evelyn Duesterwald A DEMAND-DRIVEN APPROACH FOR EFFICIENT INTERPROCEDURAL DATA FLOW ANALYSIS by Evelyn Duesterwald](https://www.pdfsearch.io/img/0def1925a0acd6d2a48652c62a9180b5.jpg) | Add to Reading ListSource URL: www.cs.ucr.eduLanguage: English - Date: 2006-05-12 12:39:54
|
---|
49![RFID Meets the Internet Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis RFID technology tracks the flow of physical items and goods in supply chains RFID Meets the Internet Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis RFID technology tracks the flow of physical items and goods in supply chains](https://www.pdfsearch.io/img/fed399f0da1133514f75877c4f028eca.jpg) | Add to Reading ListSource URL: cocoa.ethz.chLanguage: English - Date: 2013-05-23 01:51:43
|
---|
50![2008 Annual Computer Security Applications Conference Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection∗ Peng Li University of North Carolina at Chapel Hill 2008 Annual Computer Security Applications Conference Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection∗ Peng Li University of North Carolina at Chapel Hill](https://www.pdfsearch.io/img/b7feabd13f132893f89531038dbeddf3.jpg) | Add to Reading ListSource URL: flyer.sis.smu.edu.sgLanguage: English - Date: 2014-12-17 01:40:50
|
---|