Execution

Results: 6779



#Item
71

Malicious Code Insertion Example This code has a bug that allows a hacker to take control of its execution and run evilfunc(). #include // obviously it is compiler dependent // but on my system this function is

Add to Reading List

Source URL: www.technofetish.net

Language: English - Date: 2010-04-12 16:29:34
    72

    Presto Execution System: An Asynchronous Computation Engine for Animation George ElKoura Pixar Animation Studios July 24, 2013

    Add to Reading List

    Source URL: www.multithreadingandvfx.org

    Language: English - Date: 2017-09-07 21:08:04
      73

      Prototyping Symbolic Execution Engines for Interpreted Languages Stefan Bucur Johannes Kinder

      Add to Reading List

      Source URL: dslab.epfl.ch

      Language: English - Date: 2018-08-14 09:29:24
        74

        I am aware of the penalties of perjury under Federal Law, which includes the execution of a false affidavit, pursuant to 18 U.S.C.S., Section 1621 wherein it is provided that anyone found guilty shall not be fined more t

        Add to Reading List

        Source URL: www.cima-energy.com

        Language: English - Date: 2014-10-15 11:08:05
          75

          Thomson Reuters Elektron Data Platform Real-Time Venue Data For MiFID II MiFID II is redefining best practice in our industry Organizations bound by MiFID II now need to demonstrate Best Execution, with Transaction Cost

          Add to Reading List

          Source URL: mifidii.thomsonreuters.com

          Language: English - Date: 2018-08-04 01:05:50
            76

            Execution Synthesis: A Technique for Automating the Debugging of Software THÈSE NOPRÉSENTÉE LE 18 NOVEMBRE 2013 À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS

            Add to Reading List

            Source URL: dslab.epfl.ch

            Language: English - Date: 2018-08-14 09:29:24
              77

              Scaling an Object-oriented System Execution Visualizer through Sampling Andrew Chan, Reid Holmes, Gail C. Murphy and Annie T.T. Ying Department of Computer Science University of British ColumbiaMain Mall

              Add to Reading List

              Source URL: www.annieying.ca

              Language: English - Date: 2013-06-30 13:57:45
                78

                Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE Donald Nokam Kuate Sebastien Canard

                Add to Reading List

                Source URL: jc2-2017.inria.fr

                Language: English - Date: 2017-05-09 09:15:48
                  79Computer hardware / Computer architecture / Computer security / X86 architecture / Side-channel attacks / Computing / Spectre / Meltdown / CPU cache / Out-of-order execution / Speculative Store Bypass

                  Spectre and Meltdown: Data leaks during speculative execution Speaker: Jann Horn (Google Project Zero) Paul Kocher (independent) Daniel Genkin (University of Pennsylvania and

                  Add to Reading List

                  Source URL: rwc.iacr.org

                  Language: English - Date: 2018-01-18 01:49:18
                  80

                  Parallel Symbolic Execution for Automated Real-World Software Testing Stefan Bucur Vlad Ureche

                  Add to Reading List

                  Source URL: dslab.epfl.ch

                  Language: English - Date: 2018-08-14 09:29:24
                    UPDATE