Engineering Institute

Results: 21740



#Item
1Computing / Software engineering / Computer programming / Carnegie Mellon University / Carnegie Mellon Silicon Valley / Abstract interpretation / Mellon / Scala / Refinement

Vinta: Verification with INTerpolation and Abstract iterpretation Arie Gurfinkel Software Engineering Institute Carnegie Mellon University

Add to Reading List

Source URL: arieg.bitbucket.io

Language: English - Date: 2018-10-19 18:15:18
2Constraint programming / Mathematics / Lattice theory / Mathematical optimization / Applied mathematics / Constraint satisfaction / Local consistency / Semilattice / Linear programming / Optimization problem / Constraint / Feasible region

in Knowledge Engineering Reviews, 2001 Synthesis of EÆcient Constraint Satisfaction Programs Stephen J. Westfold and Douglas R. Smith Kestrel Institute 3260 Hillview Avenue

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-02 20:59:14
3Concurrent computing / Liveness / Temporal logic / Safety property / Category theory / Computation tree logic / Morphism / Dual / Category / Natural transformation / Mathematics / Mathematical logic

Evolving Specification Engineering Dusko Pavlovic, Peter Pepper, Doug Smith Email: {dusko,smith}@kestrel.edu, Kestrel Institute and Technische Universit¨ at Berlin

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-02 20:29:47
4Theoretical computer science / Formal methods / Software engineering / Logic in computer science / Formal verification / Satisfiability modulo theories / Abstract interpretation / Loop invariant / Logic programming / Model checking / KeY / Software verification

Algorithmic Logic-Based Verification with SeaHorn (Invited Tutorial) Arie Gurfinkel Software Engineering Institute Carnegie Mellon University http://arieg.bitbucket.org

Add to Reading List

Source URL: arieg.bitbucket.io

Language: English - Date: 2018-10-19 18:15:18
5Systems science / Carnegie Mellon University / Systems engineering / Systems theory / Cyberwarfare / Software Engineering Institute / System of systems / Carnegie Mellon Silicon Valley / Software engineering / Pittsburgh / Science and technology in the United States

BOXES: Abstract Domain of Boxes Arie Gurfinkel and Sagar Chaki Software Engineering Institute Carnegie Mellon University January 28, 2011

Add to Reading List

Source URL: arieg.bitbucket.io

Language: English - Date: 2018-10-19 18:15:18
6Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
7Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
8Software engineering / Theoretical computer science / Formal methods / Computing / Computer science / Computer security / Model checking / Verification / Formal verification / Carnegie Mellon University / Proof-carrying code / Software Engineering Institute

Trust in Formal Methods Toolchains Arie Gurfinkel Software Engineering Institute Carnegie Mellon University

Add to Reading List

Source URL: arieg.bitbucket.io

Language: English - Date: 2018-10-19 18:15:18
9Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
10Technology / Computing / World Wide Web / Social media / Internet vigilantism / Internet-based activism / Cyberspace / Internet culture / Online shaming / Twitter / Tweet / Hashtag

Look Before You Shame: A Study on Shaming Activities on Twitter Rajesh Basak, Niloy Ganguly, Shamik Sural, Soumya K Ghosh Department of Computer Science & Engineering, Indian Institute of Technology Kharagpur Kharagpur,

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:23:08
UPDATE