Sciweavers

9572 search results - page 1794 / 1915
» Cover Algorithms and Their Combination
Sort
View
75
Voted
IPMI
2005
Springer
16 years 1 months ago
Segmenting and Tracking the Left Ventricle by Learning the Dynamics in Cardiac Images
Having accurate left ventricle (LV) segmentations across a cardiac cycle provides useful quantitative (e.g. ejection fraction) and qualitative information for diagnosis of certain ...
Alan S. Willsky, Godtfred Holmvang, Müjdat &C...
126
Voted
ICSE
2008
IEEE-ACM
16 years 1 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
SIGSOFT
2008
ACM
16 years 1 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
121
Voted
SIGSOFT
2008
ACM
16 years 1 months ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren
118
Voted
SIGSOFT
2006
ACM
16 years 1 months ago
Dynamic slicing long running programs through execution fast forwarding
Fixing runtime bugs in long running programs using trace based analyses such as dynamic slicing was believed to be prohibitively expensive. In this paper, we present a novel execu...
Xiangyu Zhang, Sriraman Tallam, Rajiv Gupta
« Prev « First page 1794 / 1915 Last » Next »