Sciweavers

214 search results - page 17 / 43
» An Experimental Evaluation on Reliability Features of N-Vers...
Sort
View
COMSWARE
2006
IEEE
15 years 3 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
WACV
2007
IEEE
15 years 3 months ago
Threshold-based 3D Tumor Segmentation using Level Set (TSL)
Three-dimensional segmentation is reliable approach to achieve a proper estimation of tumor volume. Among all possible methods for this purpose, level set can be used as a powerfu...
Sima Taheri, Sim Heng Ong, Vincent Chong
ICASSP
2011
IEEE
14 years 1 months ago
Color correction for object tracking across multiple cameras
Color is a powerful attribute that is used to characterize objects for tracking and other surveillance tasks. Since color is dependent on ambient illumination and the imaging equi...
Satyam Srivastava, Ka Ki Ng, Edward J. Delp
KBSE
2007
IEEE
15 years 3 months ago
Exploring the neighborhood with dora to expedite software maintenance
Completing software maintenance and evolution tasks for today’s large, complex software systems can be difficult, often requiring considerable time to understand the system well...
Emily Hill, Lori L. Pollock, K. Vijay-Shanker
119
Voted
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
14 years 4 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...