Sciweavers

2237 search results - page 388 / 448
» Analysis and Testing of Web Applications
Sort
View
HPCA
2005
IEEE
15 years 11 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ICSE
2008
IEEE-ACM
15 years 11 months ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...
ICASSP
2009
IEEE
15 years 5 months ago
RLS-weighted Lasso for adaptive estimation of sparse signals
The batch least-absolute shrinkage and selection operator (Lasso) has well-documented merits for estimating sparse signals of interest emerging in various applications, where obse...
Daniele Angelosante, Georgios B. Giannakis
FSTTCS
2009
Springer
15 years 5 months ago
Donation Center Location Problem
We introduce and study the donation center location problem, which has an additional application in network testing and may also be of independent interest as a general graph-theor...
Chien-Chung Huang, Zoya Svitkina
SCALESPACE
2009
Springer
15 years 5 months ago
On Semi-implicit Splitting Schemes for the Beltrami Color Flow
The Beltrami flow is an efficient non-linear filter, that was shown to be effective for color image processing. The corresponding anisotropic diffusion operator strongly couple...
Lorina Dascal, Guy Rosman, Xue-Cheng Tai, Ron Kimm...