Sciweavers

1433 search results - page 265 / 287
» An approach to detecting failures automatically
Sort
View
ICST
2011
IEEE
14 years 3 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
FGR
2011
IEEE
241views Biometrics» more  FGR 2011»
14 years 3 months ago
Emotion recognition from an ensemble of features
— This work details the authors’ efforts to push the baseline of expression recognition performance on a realistic database. Both subject-dependent and subject-independent emot...
Usman Tariq, Kai-Hsiang Lin, Zhen Li, Xi Zhou, Zha...
PLDI
2012
ACM
13 years 2 months ago
Parcae: a system for flexible parallel execution
Workload, platform, and available resources constitute a parallel program’s execution environment. Most parallelization efforts statically target an anticipated range of environ...
Arun Raman, Ayal Zaks, Jae W. Lee, David I. August
CVPR
2012
IEEE
13 years 2 months ago
A grammar for hierarchical object descriptions in logic programs
Modeling objects using formal grammars has recently regained much attention in computer vision. Probabilistic logic programming, such as Bilattice based Logical Reasoning (BLR), i...
Toufiq Parag, Claus Bahlmann, Vinay D. Shet, Manee...
DIM
2008
ACM
15 years 26 days ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le