Sciweavers

1565 search results - page 133 / 313
» An unlikely result
Sort
View
86
Voted
SIGSOFT
2008
ACM
16 years 1 months ago
Automated identification of parameter mismatches in web applications
Quality assurance techniques for web applications have become increasingly important as web applications have gained in popularity and become an essential part of our daily lives....
William G. J. Halfond, Alessandro Orso
SIGSOFT
2005
ACM
16 years 1 months ago
SOBER: statistical model-based bug localization
Automated localization of software bugs is one of the essential issues in debugging aids. Previous studies indicated that the evaluation history of program predicates may disclose...
Chao Liu 0001, Jiawei Han, Long Fei, Samuel P. Mid...
126
Voted
ISBI
2006
IEEE
16 years 1 months ago
Tracking cortical surface deformations based on vessel structure using a laser range scanner
This paper reports a vessel structure based non-rigid registration method for cortical surface registration and deformation tracking using a laser-range scanner(LRS). The LRS cont...
Aize Cao, Prashanth Dumpuri, Michael I. Miga
213
Voted
POPL
2009
ACM
16 years 1 months ago
Types and higher-order recursion schemes for verification of higher-order programs
We propose a new verification method for temporal properties of higher-order functional programs, which takes advantage of Ong's recent result on the decidability of the mode...
Naoki Kobayashi
95
Voted
EUROCRYPT
2009
Springer
16 years 1 months ago
A Leakage-Resilient Mode of Operation
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to ? but weaker than ? a pseudorandom function: for wPRFs one only requires that the output is pseudorandom...
Krzysztof Pietrzak