Sciweavers

2957 search results - page 270 / 592
» Code analysis and CS-XML
Sort
View
IVC
2002
121views more  IVC 2002»
15 years 3 months ago
Automatic extraction of the face identity-subspace
Facial variation divides into a number of functional subspaces, and ensemblespecific variation. An improved method of measuring these is presented, within the space defined by an ...
Nicholas Costen, Timothy F. Cootes, Gareth J. Edwa...
132
Voted
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
15 years 3 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler
ISAMI
2010
15 years 1 months ago
Employing Compact Intra-genomic Language Models to Predict Genomic Sequences and Characterize Their Entropy
Probabilistic models of languages are fundamental to understand and learn the profile of the subjacent code in order to estimate its entropy, enabling the verification and predicti...
Sérgio A. D. Deusdado, Paulo Carvalho
130
Voted
POPL
2011
ACM
14 years 6 months ago
Precise reasoning for programs using containers
Containers are general-purpose data structures that provide functionality for inserting, reading, removing, and iterating over elements. Since many applications written in modern ...
Isil Dillig, Thomas Dillig, Alex Aiken
164
Voted
ASPDAC
2012
ACM
265views Hardware» more  ASPDAC 2012»
13 years 11 months ago
Improving validation coverage metrics to account for limited observability
—In both pre-silicon and post-silicon validation, the detection of design errors requires both stimulus capable of activating the errors and checkers capable of detecting the beh...
Peter Lisherness, Kwang-Ting Cheng