Symbolic system

Results: 148



#Item
61Computer security / Hacking / Computer network security / Vulnerability / Communications protocol / Social vulnerability / Symbolic execution / Intrusion prevention system / Parsing / Computing / Software testing / Cyberwarfare

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration Juan Caballero21 , Zhenkai Liang3 , Pongsin Poosankam21 , Dawn Song1 1

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
62.htaccess / File managers / Webserver directory index / Home directory / File Transfer Protocol / Folder / Find / Symbolic link / File Manager / Computing / Software / System software

Web Developer Guide © 2004 Alabanza Corporation. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication m

Add to Reading List

Source URL: advancederesources.com

Language: English - Date: 2004-11-19 02:08:23
63Capitalism / Pricing / Marketing / Microeconomics / Price / Valuation / Value / Market / Free price system / Economics / Terminology / Marxist theory

Symbolic meanings of prices: Constructing the value of contemporary art in Amsterdam and New York galleries OLAV VELTHUIS University of Konstanz, Germany Abstract. This article develops a sociological analysis of the pr

Add to Reading List

Source URL: isaacleung.com

Language: English - Date: 2014-02-03 06:12:50
64Symbolic execution / Symbol / Algorithm / Computing / KeY / Dynamical system / Applied mathematics / Formal methods / Computer programming / Taint checking

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
65Symbolic execution / Symbol / Algorithm / Computing / KeY / Dynamical system / Applied mathematics / Formal methods / Computer programming / Taint checking

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2012-03-12 11:18:03
66Mathematical analysis / Signal processing / Cybernetics / Mathematical optimization / Genetic algorithms / Genetic programming / John Koza / LTI system theory / Impulse response / Mathematics / Applied mathematics / Control theory

USE OF GENETIC PROGRAMMING TO FIND AN IMPULSE RESPONSE FUNCTION IN SYMBOLIC FORM( *) John R. Koza (1), Martin A. Keane (2) and James P. Rice (3) Abstract: The recently developed genetic programming paradigm provides a wa

Add to Reading List

Source URL: www.genetic-programming.com

Language: English - Date: 2006-11-17 21:18:26
67Computer architecture / Ext2 / Inode / Stat / Extended file system / File system / Symbolic link / GNU Hurd / Unix File System / Disk file systems / System software / Data management

The extended-2 lesystem overview Gadi Oxman, [removed] v0.1, August[removed]Contents

Add to Reading List

Source URL: www.nondot.org

Language: English - Date: 1998-10-27 05:17:45
68Australia / Jindyworobak Movement / Australian Aboriginal culture / Ian Mudie / Oodgeroo Noonuccal / Bush poet / Jayne Fenton Keane / Indigenous Australians / Lionel Fogarty / Australian literature / Literature / Australian poetry

Tuesday, 24 February 2009 Australian poetry; reflections on nature, space and identity The national symbolic is a fantasy of collective identity and expression but, at the same time, it is also a powerful system of contr

Add to Reading List

Source URL: eprints.usq.edu.au

Language: English - Date: 2013-07-02 20:01:26
69Open / MOV / TI-990 / Computer architecture / X86 instructions / ARM architecture

ARM System Calls SWI_WriteC (SWI 0) Write a byte, passed in register 0, to the debug channel. When executed under the symbolic debugger, the character will appear on the display device connected to the debugger. SWI_Writ

Add to Reading List

Source URL: www.ee.ic.ac.uk

Language: English - Date: 2000-02-01 16:51:54
70Data management / Ext2 / Inode / Ext3 / Ext4 / Hyperlink / Symbolic link / File system / Ln / Disk file systems / Computing / System software

The Second Extended File System

Add to Reading List

Source URL: www.nongnu.org

Language: English - Date: 2011-02-04 19:44:27
UPDATE