Sciweavers

191 search results - page 36 / 39
» Comparing Program Phase Detection Techniques
Sort
View
PLDI
2009
ACM
15 years 7 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
104
Voted
CSB
2002
IEEE
121views Bioinformatics» more  CSB 2002»
15 years 5 months ago
Fast and Sensitive Algorithm for Aligning ESTs to Human Genome
There is a pressing need to align growing set of expressed sequence tags (ESTs) to newly sequenced human genome. The problem is, however, complicated by the exon/intron structure ...
Jun Ogasawara, Shinichi Morishita
DSN
2007
IEEE
15 years 6 months ago
Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance
Transient faults are emerging as a critical concern in the reliability of general-purpose microprocessors. As architectural trends point towards multi-threaded multi-core designs,...
Alex Shye, Tipp Moseley, Vijay Janapa Reddi, Josep...
TCSV
2008
291views more  TCSV 2008»
15 years 8 days ago
A Statistical Video Content Recognition Method Using Invariant Features on Object Trajectories
Abstract--This work is dedicated to a statistical trajectorybased approach addressing two issues related to dynamic video content understanding: recognition of events and detection...
Alexandre Hervieu, Patrick Bouthemy, Jean-Pierre L...
97
Voted
DIMVA
2008
15 years 1 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar