GitHub

Results: 3844



#Item
111Computing / Computer programming / C / Data types / Pointer / Hooking / Exec / Nm / Struct

Executable Counterexamples in Software Model Checking J. Gennari1 and A. Gurfinkel2 and T. Kahsai3 and J. A. Navas4 and E. J. Schwartz1 Presenter: Natarajan Shankar4 1 Carnegie

Add to Reading List

Source URL: seahorn.github.io

Language: English - Date: 2018-08-03 20:31:21
112

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:58
    113

    S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing

    Add to Reading List

    Source URL: acmccs.github.io

    Language: English - Date: 2017-12-30 21:51:59
      114Central Intelligence Agency / Cold War in popular culture / McLean /  Virginia / Change impact analysis / Program slicing / Mining software repositories / Reverse engineering / Software engineering / Computing / Change

      SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. ReliabPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: stvr.1475 A survey of code-based change impact analysis te

      Add to Reading List

      Source URL: zhang-sai.github.io

      Language: English - Date: 2015-05-05 00:58:34
      115Computing / Webmail / Cybercrime / Software / Fraud / Spamming / Gmail / Phishing / The Spamhaus Project / Identity theft / Yahoo! Mail / Botnet

      What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild Jeremiah Onaolapo, Enrico Mariconti, and Gianluca Stringhini University College London {j.onaolapo, e.mariconti, g.stringhi

      Add to Reading List

      Source URL: jonaolapo.github.io

      Language: English - Date: 2018-10-25 12:11:25
      116Behavior modification / Behaviorism / Token economy / Token coin / Cryptocurrencies / Economy / Psychology / Money / Computer access control

      The attached white paper is meant to describe the currently anticipated plans of Messari Inc. (“​Messari​”) for developing a new blockchain token mechanism (“​Token​”) that will be used on the network spo

      Add to Reading List

      Source URL: messari.github.io

      Language: English - Date: 2018-10-11 11:52:47
      117Software testing / Software development / Psychometrics / Software engineering / Intelligence / Computing / Extreme programming / Unit testing / Test / Code coverage / Intelligence quotient / Student's t-test

      PDF Document

      Add to Reading List

      Source URL: zhang-sai.github.io

      Language: English - Date: 2015-05-05 00:58:34
      118Mathematics / Theoretical computer science / Elementary mathematics / Compiler optimizations / Static single assignment form / Logic programming / Scope / Unification / Term / FO / Variable / Singular spectrum analysis

      Under consideration for publication in Theory and Practice of Logic Programming 1 Horn Clauses as an Intermediate Representation for Program Analysis and Transformation∗

      Add to Reading List

      Source URL: jorgenavas.github.io

      Language: English - Date: 2018-10-25 12:43:22
      119

      Session A4: Browsers CCS’17, October 30-November 3, 2017, Dallas, TX, USA Deterministic Browser Yinzhi Cao

      Add to Reading List

      Source URL: acmccs.github.io

      Language: English - Date: 2017-12-30 21:51:58
        120Theoretical computer science / Software engineering / Constraint programming / Computing / Formal methods / Logic in computer science / Electronic design automation / NP-complete problems / Satisfiability modulo theories / Solver / SMT / Constraint satisfaction problem

        The SMT-LIBv2 Language and Tools: A Tutorial David R. Cok GrammaTech, Inc. VersionNovember 23, 2013

        Add to Reading List

        Source URL: smtlib.github.io

        Language: English - Date: 2015-12-24 13:35:05
        UPDATE