咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 20 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 6 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
  • 5 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 26 篇 control flow gra...
  • 3 篇 node splitting
  • 3 篇 compilation
  • 2 篇 compiler optimiz...
  • 2 篇 program analysis
  • 2 篇 reducibility
  • 2 篇 instruction-leve...
  • 2 篇 irreducibility
  • 2 篇 object-oriented ...
  • 2 篇 malware detectio...
  • 2 篇 convolutional ne...
  • 2 篇 software defect ...
  • 1 篇 global register ...
  • 1 篇 electromagnetic ...
  • 1 篇 cyber security
  • 1 篇 hyper-operation
  • 1 篇 permission contr...
  • 1 篇 program analysis...
  • 1 篇 compilers
  • 1 篇 firefly algorith...

机构

  • 1 篇 ist austria klos...
  • 1 篇 ferdowsi univ ma...
  • 1 篇 thiagarajar coll...
  • 1 篇 univ melbourne d...
  • 1 篇 lawrence livermo...
  • 1 篇 mahallat inst hi...
  • 1 篇 dartmouth coll h...
  • 1 篇 open univ nether...
  • 1 篇 gazi univ fac en...
  • 1 篇 univ saarland d-...
  • 1 篇 nasa ames res ct...
  • 1 篇 shanghai jiao to...
  • 1 篇 delft univ techn...
  • 1 篇 le quy don tech ...
  • 1 篇 virginia tech bl...
  • 1 篇 [a]data processi...
  • 1 篇 rvs coll engn de...
  • 1 篇 saudi aramco cor...
  • 1 篇 penn state univ ...
  • 1 篇 kaunas univ tech...

作者

  • 2 篇 cybenko george
  • 1 篇 peng hao
  • 1 篇 shar lwin khin
  • 1 篇 raz gil
  • 1 篇 stuckey peter j.
  • 1 篇 rajnish kumar
  • 1 篇 atici mehmet ali
  • 1 篇 bhattacharjee va...
  • 1 篇 tun yan naing
  • 1 篇 nitish kumar
  • 1 篇 bichhawat abhish...
  • 1 篇 henriques pedro ...
  • 1 篇 alotaibi saud s.
  • 1 篇 malviya vikas k.
  • 1 篇 xynyn ailys tee
  • 1 篇 devkota sabin
  • 1 篇 janssen johan
  • 1 篇 zhong ming
  • 1 篇 ji shouling
  • 1 篇 isaacs katherine...

语言

  • 25 篇 英文
  • 1 篇 中文
检索条件"主题词=Control Flow Graphs"
26 条 记 录,以下是11-20 订阅
排序:
The application of hypergroups in symbolic executions and finite automata
收藏 引用
SOFT COMPUTING 2021年 第11期25卷 7247-7256页
作者: Heidari, Dariush Doostali, Saeed Mahallat Inst Higher Educ Fac Sci Mahallat Iran Mahallat Inst Higher Educ Fac Engn Mahallat Iran
Symbolic execution is one of the most important testing techniques to ensure the quality of software systems that need to be dependable and reliable. This technique systematically explores the program of the subject s... 详细信息
来源: 评论
Handling irreducible loops: Optimized node splitting versus DJ-graphs
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 2002年 第4期24卷 299-333页
作者: Unger, S Mueller, F N Carolina State Univ CS Dept Raleigh NC 27695 USA
This paper addresses the question of how to handle irreducible regions during optimization, which has become even more relevant for contemporary processors since recent VLIW-like architectures highly rely on instructi... 详细信息
来源: 评论
From Debugging-Information Based Binary-Level Type Inference to CFG Generation  18
From Debugging-Information Based Binary-Level Type Inference...
收藏 引用
8th ACM Conference on Data and Application Security and Privacy (CODASPY)
作者: Zeng, Dongrui Tan, Gang Penn State Univ State Coll PA 16801 USA
Binary-level control-flow Graph (CFG) construction is essential for applications such as control-flow integrity. There are two main approaches: the binary-analysis approach and the compiler-modification approach. The ... 详细信息
来源: 评论
The Treewidth of Smart Contracts  19
The Treewidth of Smart Contracts
收藏 引用
34th ACM/SIGAPP Annual International Symposium on Applied Computing (SAC)
作者: Chatterjee, Krishnendu Goharshady, Amir Kafshdar Goharshady, Ehsan Kafshdar IST Austria Klosterneuburg Austria Ferdowsi Univ Mashhad Mashhad Razavi Khorasan Iran
Smart contracts are programs that are stored and executed on the Blockchain and can receive, manage and transfer money (cryptocurrency units). Two important problems regarding smart contracts are formal analysis and c... 详细信息
来源: 评论
Exception Handling for Dynamic Information flow control  2014
Exception Handling for Dynamic Information Flow Control
收藏 引用
36th International Conference on Software Engineering ((ICSE Companion)
作者: Bichhawat, Abhishek Univ Saarland D-66123 Saarbrucken Germany
Exceptions arc a source of information leaks, which arc difficult to handle as they allow for non-local control transfer. Existing dynamic information flow control techniques either ignore unstructured control flow or... 详细信息
来源: 评论
Novel Method to Generate Tests for VHDL
Novel Method to Generate Tests for VHDL
收藏 引用
19th International Conference on Information and Software Technologies (ICIST)
作者: Jusas, Vacius Neverdauskas, Tomas Kaunas Univ Technol Software Engn Dept LT-51368 Kaunas Lithuania
Verification is the most crucial part of the chip design process. Test benches, which are used to test VHDL code, need perform efficiently and effectively. We present an algorithm that achieves high code coverage by a... 详细信息
来源: 评论
Graph Models in Tracking Behaviors for Cyber-Security  6th
Graph Models in Tracking Behaviors for Cyber-Security
收藏 引用
6th International Workshop on Graphical Models for Security (GraMSec)
作者: Cybenko, George Thayer Sch Engn Hanover NH 03750 USA
This chapter briefly summarizes recent research on the problem of inferring security properties of a computation from measurements of unintended electromagnetic emissions from the processing system on which the comput... 详细信息
来源: 评论
control flow Graph Modifications for Improved RF-based Processor Tracking Performance
Control Flow Graph Modifications for Improved RF-based Proce...
收藏 引用
Conference on Cyber Sensing
作者: Chilenski, Mark Cybenko, George Dekine, Isaac Kumar, Piyush Raz, Gil Syst & Technol Res Woburn MA 01801 USA Dartmouth Coll Hanover NH 03755 USA
Many dedicated embedded processors do not have memory or computational resources to coexist with traditional (host-based) security solutions. As a result, there is interest in using out-of-band analog side-channel mea... 详细信息
来源: 评论
Domain-Centered Support for Layout, Tasks, and Specification for control flow Graph Visualization
Domain-Centered Support for Layout, Tasks, and Specification...
收藏 引用
10th IEEE Working Conference on Software Visualization (IEEE VISSOFT)
作者: Devkota, Sabin LeGendre, Matthew P. Kunen, Adam Aschwanden, Pascal Isaacs, Katherine E. Univ Arizona Tucson AZ 85721 USA Lawrence Livermore Natl Lab Livermore CA USA Univ Utah Salt Lake City UT USA
Computing professionals in areas like compilers, performance analysis, and security often analyze and manipulate control flow graphs (CFGs) in their work. CFGs are directed networks that describe possible orderings of... 详细信息
来源: 评论
STUDY OF UNIT AND DATA flow TESTING IN OBJECT-ORIENTED AND ASPECT-ORIENTED PROGRAMMING  1
STUDY OF UNIT AND DATA FLOW TESTING IN OBJECT-ORIENTED AND A...
收藏 引用
1st International Conference on Innovation and Challenges in Cyber Security (ICICCS)
作者: Chandra, Alaknanda Singhal, Abhishek Amity Univ Uttar Pradesh Amity Sch Engn & Technol Noida India
Software Testing is an evaluation mechanism that signifies the importance of software quality assurance, which will evaluate a particular system to check if it will satisfy all the requirements specified by the user. ... 详细信息
来源: 评论