Sciweavers

1411 search results - page 118 / 283
» A Value Analysis for C Programs
Sort
View
AIPR
2008
IEEE
15 years 11 months ago
Temporal structure methods for image-based change analysis
– This paper addresses the exploitation of massive numbers of image-derived change detections. We use the term “change analysis” to emphasize the intelligence value obtained ...
Ray Rimey, Dan Keefe
MICCAI
2010
Springer
15 years 2 months ago
Cardiac Motion Estimation Using a ProActive Deformable Model: Evaluation and Sensitivity Analysis
To regularize cardiac motion recovery from medical images, electromechanical models are increasingly popular for providing a priori physiological motion information. Although these...
Ken C. L. Wong, Florence Billet, Tommaso Mansi, Ra...
PLDI
2009
ACM
15 years 11 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
CCS
2007
ACM
15 years 8 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...
133
Voted
CORR
2010
Springer
320views Education» more  CORR 2010»
15 years 4 months ago
An algorithm for the principal component analysis of large data sets
Recently popularized randomized methods for principal component analysis (PCA) efficiently and reliably produce nearly optimal accuracy -- even on parallel processors -- unlike the...
Nathan Halko, Per-Gunnar Martinsson, Yoel Shkolnis...