Symbolic

Results: 1438



#Item
771Geography of Missouri / United States / Opposition to the Vietnam War / Tinker v. Des Moines Independent Community School District / First Amendment to the United States Constitution / North High School / Symbolic speech / Iowa / Kansas City /  Missouri / States of the United States / Geography of the United States / Kansas City metropolitan area

National Archives at Kansas City newsletter

Add to Reading List

Source URL: www.archives.gov

Language: English - Date: 2015-01-30 14:55:30
772Mathematical analysis / Signal processing / Cybernetics / Mathematical optimization / Genetic algorithms / Genetic programming / John Koza / LTI system theory / Impulse response / Mathematics / Applied mathematics / Control theory

USE OF GENETIC PROGRAMMING TO FIND AN IMPULSE RESPONSE FUNCTION IN SYMBOLIC FORM( *) John R. Koza (1), Martin A. Keane (2) and James P. Rice (3) Abstract: The recently developed genetic programming paradigm provides a wa

Add to Reading List

Source URL: www.genetic-programming.com

Language: English - Date: 2006-11-17 21:18:26
773Computer architecture / Ext2 / Inode / Stat / Extended file system / File system / Symbolic link / GNU Hurd / Unix File System / Disk file systems / System software / Data management

The extended-2 lesystem overview Gadi Oxman, [removed] v0.1, August[removed]Contents

Add to Reading List

Source URL: www.nondot.org

Language: English - Date: 1998-10-27 05:17:45
774Knowledge / Information seeking / Information systems / Personal information management / Sensemaking / Symbolic interactionism / Library and information science / Elfreda Chatman / Information science / Science / Information

Special Section ASIS&T ANNUAL MEETING PRE-CONFERENCE ACTIVITIES Bulletin of the Association for Information Science and Technology – February/March 2015 – Volume 41, Number 3

Add to Reading List

Source URL: www.asis.org

Language: English - Date: 2015-02-02 14:32:21
775Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

Add to Reading List

Source URL: security.ece.cmu.edu

Language: English - Date: 2011-05-02 14:34:52
776Science / Leadership studies / Social psychology / Anthropology / Criminology / Symbolic interactionism / Interactionism / Leadership / Educational leadership / Social philosophy / Sociology / Sociological paradigms

Microsoft Word - Final Electronic Thesis.doc

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:11:03
777Software testing / Automated theorem proving / Concolic testing / Software metrics / KeY / Symbolic execution / Code coverage / Control flow graph / Algorithm / Software / Computing / Formal methods

Enhancing Symbolic Execution with Veritesting Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley Carnegie Mellon University {thanassis, alexandre, sangkilc, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-03-17 11:29:44
778Printf format string / Disk formatting / Year 10 / 000 problem / Microsoft Office / SYmbolic LinK / Spreadsheet / Software / Computing / Microsoft Excel

4002book.fm Page 258 Friday, March 24, [removed]:36 PM 258 Chapter 7

Add to Reading List

Source URL: www.personal-computer-tutor.com

Language: English - Date: 2008-11-05 11:17:00
779Computer / John Vincent Atanasoff / Mind / Science / Electronics / Malware / Software bug / Analysis

Thursday, Oct. 2nd 3:40p.m. @ B29 Atanasoff Program Representation for Symbolic Analysis Symbolic analysis is a type of program analysis

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2014-10-03 09:24:23
780Symbolic execution / David Brumley / Higher education / Academia / Computer programming / Taint checking / Carnegie Mellon University

All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) (Yes, we were trying to overflow the title length field

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2010-08-16 00:26:51
UPDATE