Symbolic

Results: 1438



#Item
501

FiE on Firmware Finding Vulnerabilities in Embedded Systems using Symbolic Execution Drew Davidson Ben Moench Somesh Jha

Add to Reading List

Source URL: wisdom.cs.wisc.edu

Language: English - Date: 2014-05-19 12:57:29
    502

    Sage: Open Source Mathematical Software: Symbolic Computation, Combinatorial Species, Backtracking Algorithms, and Distributed Computation William Stein, Gary Furnish, Mike Hansen, Robert Miller, and Yi Qiang March 21, 2

    Add to Reading List

    Source URL: wstein.org

    Language: English - Date: 2008-04-08 08:25:32
      503

      Smten: Automatic Translation of High-level Symbolic Computations into SMT Queries Richard Uhler1, Nirav Dave2 1 Massachusetts Institute of Technology, Computer Science and Artificial Intelligence Laboratory, Cambridge,

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2013-08-12 10:28:06
        504

        GREENHOUSE POINSETTIA THE SYMBOLIC FLOWER FOR CHRISTMAS Light. Poinsettias would prefer to be in bright, indirect light, although a temporary home as a centerpiece on a table, if watered properly, should not cause harm.

        Add to Reading List

        Source URL: www.familytreenursery.com

        Language: English - Date: 2015-05-18 16:03:38
          505

          Ancora Crafts DESIGN - XS GUIDE TO THE NFL Symbolic Color DMC Color Number

          Add to Reading List

          Source URL: ancoracrafts.com

          - Date: 2014-09-11 12:16:46
            506

            A Case Study in Integrating Probabilistic Decision Making and Learning in a Symbolic Cognitive Architecture: Soar Plays Dice John E. Laird, Nate Derbinsky, and Miller Tinkerhess University of Michigan 2260 Hayward St. An

            Add to Reading List

            Source URL: alpha.tmit.bme.hu

            Language: English - Date: 2012-02-27 10:30:34
              507

              Symbolic Software Model Validation Cynthia Sturton,1 Rohit Sinha,2 Thurston H.Y. Dang,2 Sakshi Jain,2 Michael McCoyd,2 Wei Yang Tan,2 Petros Maniatis,3 Sanjit A. Seshia,2 and David Wagner 2 1 University of North Carolin

              Add to Reading List

              Source URL: www.cs.berkeley.edu

              Language: English - Date: 2015-01-21 19:48:40
                508

                Centre for International Borders Research (CIBR) Electronic Working Paper Series: www.qub.ac.uk/cibr Theorizing the Spanish-Moroccan Border Reconfiguration: Framing a Process of Geopolitical, Functional and Symbolic Rebo

                Add to Reading List

                Source URL: www.qub.ac.uk

                Language: English - Date: 2015-06-04 14:11:05
                  509

                  F IE on Firmware: Finding Vulnerabilities in Embedded Systems using Symbolic Execution Drew Davidson Benjamin Moench Somesh Jha Thomas Ristenpart

                  Add to Reading List

                  Source URL: pages.cs.wisc.edu

                  Language: English - Date: 2013-07-04 17:31:41
                    UPDATE