Sciweavers

1682 search results - page 268 / 337
» Applying Conventional Testing Techniques for Class Testing
Sort
View
134
Voted
TIFS
2008
148views more  TIFS 2008»
15 years 3 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
225
Voted
TAPIA
2009
ACM
15 years 8 months ago
Research experiences for undergraduates: autonomic computing research at FIU
According to Computing Research Association, during each year between 2003 and 2007, fewer than 3% of the US’s Ph.D.s graduates in computer science and computer engineering were...
Masoud Milani, Seyed Masoud Sadjadi, Raju Rangaswa...
153
Voted
ISSTA
2010
ACM
15 years 7 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
153
Voted
JFR
2007
163views more  JFR 2007»
15 years 3 months ago
Real-time localization and elevation mapping within urban search and rescue scenarios
Urban Search And Rescue (USAR) is a time critical task. Rescue teams have to explore a large terrain within a short amount of time in order to locate survivors after a disaster. O...
Alexander Kleiner, Christian Dornhege
160
Voted
ISSTA
2012
ACM
13 years 6 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...