Learn More
Static analysis tools used for detecting information exposure bugs can help software engineers detecting bugs without introducing run-time overhead. Such tools can make the detection of information-flow bugs faster and cheaper without having to provide user input in order to trigger the bug detection. In this paper we present a bug-detection tool for(More)
In many C programs, debugging requires significant effort and can consume a lot of time. Even if the bug's cause is known, detecting a bug in such programs and generating a bug fix patch manually is a tedious task. In this paper, we present a novel approach used to generate bug fixes for buffer overflow automatically using static execution, code patch(More)
  • P Muntean
  • 1991
In the course of 1 year we investigated 32 patients suffering from retrobulbar neuritis, using photographs of the retinal nerve fiber layer (RNFL). All photographs revealed defects of the RNFL in the area of the papillomacular bundle. These observations were compared with photographs of eyes not affected by any ophthalmological diseases. No loss of retinal(More)
—Mobile robot navigation in total or partially unknown environments is still an open problem. The path planning algorithms lack completeness and/or performance. Thus, there is the need for complete (i.e., the algorithm determines in finite time either a solution or correctly reports that there is none) and performance (i.e., with low computational(More)
Dyslexia is a reading disability that can, in some cases, be cured. The most frequent treatment for dyslexia consists on repeatedly performing certain word exercises. Because most dyslexic patients are young children, most applications for word training are games. The development of such games is costly and it involves different parts (developers,(More)
Es werden die ophthalmologischen Befunde eines 13jährigen, männlichen Patienten angeführt, bei dem ein großes, die Makula kreuzendes Gefäß am rechten Augenhintergrund auffällig war. Die bei dem beschwerdefreien Patienten durchgeführte Computerperimetrie zeigte ein kleines Angioskotom. Somit gelang es zum ersten Mal, ein Angioskotom mit einem speziellen(More)
Information flow vulnerabilities in UML statecharts and C code are detrimental as they can cause data leakages or unexpected program behavior. Detecting such vulnerabilities with static code analysis techniques is challenging because code is usually not available during the software design phase and previous knowledge about what should be annotated and(More)
Integer overflow errors in C programs are difficult to detect since the C language specification rules which govern how one can cast or promote integer types are not accompanied by any unambiguous set of formal rules. Thus, making it difficult for the programmer to understand and use the rules correctly causing vulnerabilities or costly errors. Although(More)
Es wurden Nervenfaserfotografien von Patienten mit intraokulären Druckwerten von 21 mm Hg und darüber untersucht und mit den dazugehörigen Gesichtsfeldbefunden verglichen. Einerseits zeigte sich die eindeutige Korrelation zwischen Nervenfaserschichtdefekten und bereits korrespondierenden Gesichtsfeldverlusten, andererseits geht aus allen bisherigen Studien(More)