ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Ways of Synthesizing Binary Programs Admitting Recursive Call of Procedures
Moscow University Computational Mathematics and Cybernetics
◽
10.3103/s0278641921030079
◽
2021
◽
Vol 45
(3)
◽
pp. 87-95
Author(s):
V. V. Zhukov
Keyword(s):
Recursive Call
◽
Binary Programs
Download Full-text
Related Documents
Cited By
References
Concise RLT forms of binary programs: A computational study of the quadratic knapsack problem
Naval Research Logistics (NRL)
◽
10.1002/nav.20364
◽
2009
◽
Vol 57
(1)
◽
pp. 1-12
◽
Cited By ~ 3
Author(s):
Richard J. Forrester
◽
Warren P. Adams
◽
Paul T. Hadavas
Keyword(s):
Knapsack Problem
◽
Computational Study
◽
Quadratic Knapsack Problem
◽
Quadratic Knapsack
◽
Binary Programs
Download Full-text
Disjunctive Decomposition for Two-Stage Stochastic Mixed-Binary Programs with Random Recourse
Operations Research
◽
10.1287/opre.1090.0693
◽
2010
◽
Vol 58
(1)
◽
pp. 229-243
◽
Cited By ~ 27
Author(s):
Lewis Ntaimo
Keyword(s):
Two Stage
◽
Binary Programs
Download Full-text
SHFuzz: A hybrid fuzzing method assisted by static analysis for binary programs
China Communications
◽
10.23919/jcc.2021.08.001
◽
2021
◽
Vol 18
(8)
◽
pp. 1-16
Author(s):
Wenjie Wang
◽
Donghai Tian
◽
Rui Ma
◽
Hang Wei
◽
Qianjin Ying
◽
...
Keyword(s):
Static Analysis
◽
Binary Programs
Download Full-text
VulLocator: Automatically Locating Vulnerable Code in Binary Programs
Information Security Practice and Experience - Lecture Notes in Computer Science
◽
10.1007/978-3-642-38033-4_21
◽
2013
◽
pp. 295-308
Author(s):
Yingjun Zhang
◽
Kai Chen
◽
Yifeng Lian
Keyword(s):
Binary Programs
Download Full-text
Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis
Information and Communications Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-17650-0_26
◽
2010
◽
pp. 367-382
◽
Cited By ~ 5
Author(s):
Kai Chen
◽
Yifeng Lian
◽
Yingjun Zhang
Keyword(s):
Taint Analysis
◽
Binary Programs
Download Full-text
A simple, all primal branch and bound approach to pure and mixed integer binary programs
Operations Research Letters
◽
10.1016/0167-6377(82)90036-0
◽
1982
◽
Vol 1
(5)
◽
pp. 182-185
◽
Cited By ~ 6
Author(s):
Gary A. Kochenberger
◽
Victor H. Richard
Keyword(s):
Branch And Bound
◽
Mixed Integer
◽
Binary Programs
Download Full-text
Automated Identification of Cryptographic Primitives in Binary Programs
Lecture Notes in Computer Science - Recent Advances in Intrusion Detection
◽
10.1007/978-3-642-23644-0_3
◽
2011
◽
pp. 41-60
◽
Cited By ~ 42
Author(s):
Felix Gröbert
◽
Carsten Willems
◽
Thorsten Holz
Keyword(s):
Automated Identification
◽
Cryptographic Primitives
◽
Binary Programs
Download Full-text
Sparsity of integer formulations for binary programs
Operations Research Letters
◽
10.1016/j.orl.2019.06.001
◽
2019
◽
Vol 47
(5)
◽
pp. 348-352
Author(s):
Christopher Hojny
◽
Hendrik Lüthen
◽
Marc E. Pfetsch
Keyword(s):
Integer Formulations
◽
Binary Programs
Download Full-text
TypeMiner: Recovering Types in Binary Programs Using Machine Learning
Detection of Intrusions and Malware, and Vulnerability Assessment - Lecture Notes in Computer Science
◽
10.1007/978-3-030-22038-9_14
◽
2019
◽
pp. 288-308
◽
Cited By ~ 4
Author(s):
Alwin Maier
◽
Hugo Gascon
◽
Christian Wressnegger
◽
Konrad Rieck
Keyword(s):
Machine Learning
◽
Binary Programs
Download Full-text
Towards automated integrity protection of C++ virtual function tables in binary programs
Proceedings of the 30th Annual Computer Security Applications Conference on - ACSAC '14
◽
10.1145/2664243.2664249
◽
2014
◽
Cited By ~ 24
Author(s):
Robert Gawlik
◽
Thorsten Holz
Keyword(s):
Integrity Protection
◽
Binary Programs
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close