Sciweavers

6960 search results - page 198 / 1392
» Continuity Analysis of Programs
Sort
View
102
Voted
KBSE
2009
IEEE
15 years 10 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
191
Voted
ICSE
2012
IEEE-ACM
13 years 5 months ago
Temporal analysis of API usage concepts
—Software reuse through Application Programming Interfaces (APIs) is an integral part of software development. The functionality offered by an API is not always accessed uniforml...
Gias Uddin, Barthélémy Dagenais, Mar...
119
Voted
BIRTHDAY
2009
Springer
15 years 10 months ago
Is the World Linear?
Super-resolution is the art of creating nice high-resolution raster images from given low-resolution raster images. Since “nice” is not a well-defined term in mathematics and ...
Rudolf Fleischer
190
Voted
ECOOP
2003
Springer
15 years 8 months ago
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
Despite Java’s automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash...
Nick Mitchell, Gary Sevitsky
BIOCOMP
2006
15 years 4 months ago
Surgeon's Magic Wand: A Screen Pointing Interactive Method
: A novel, non-touch, screen pointing "magic wand" interface is proposed for surgeon's use in an environment requiring simultaneous display of several patients'...
Naren Vira, Shaleen Vira