The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital storage oscilloscope (DSO) is, with applied far going, high sampling frequency and measuring accuracy, a common testing instrument in signal acquisition and processing. While many DSOs are used together to measure multi-channels of signals, there exist some problems in synchronous comparing, acquisition, storage and plots of different signals. In order to solve these problems, the features...
Symbolic Execution based defect discovery techniques for binary programs are now widely applied. However, because of the path explosion problem, it's still not applicable for security analysis on large programs. A great many infeasible paths in the target program also reduce the performance. To fast generate test cases reaching the potentially vulnerable program points, this paper introduces constraints...
During the multi-dimensional Fuzzing technique, how to construct the influencing relationships between input elements and vulnerable statements is a key problem. This paper applies the virtual machine based taint analysis technique on multi-dimensional Fuzzing, gives detailed design and the experiment result shows the method is feasible.
Many software industrial association established in all provincial capital cities in China. Providing service for talents and company is their main responsibilities. The evaluation of software talents skills is multi-factor, multi-objective and multi-criteria decision-making problems. The current selection and evaluation method which the company used commonly is single, non-objective, non-universal...
Knowledge-based Fuzzing technology successfully applies in software vulnerability mining, however, current Fuzzing technology mainly focuses on fuzzing target software based on single data sample and thus the vulnerability mining results are not stable, false negatives of vulnerability are high and the selection of data sample depends on people's analysis. To solve these problems, this paper proposes...
Along with the development of science and technology, information technologies have been used in many fields. Energy problem is a social focus nowadays. Energy-saving and environmental protection is the policy of China. According to our national conditions, road lighting system of our country is still emerging technologies. In this paper, to reach the purpose of energy saving, it introduces an information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.