Sciweavers

207 search results - page 12 / 42
» Detecting Bottleneck in n-Tier IT Applications Through Analy...
Sort
View
ICIAR
2010
Springer
15 years 3 months ago
On-Board Monocular Vision System Pose Estimation through a Dense Optical Flow
Abstract. This paper presents a robust technique for estimating onboard monocular vision system pose. The proposed approach is based on a dense optical flow that is robust against...
Naveen Onkarappa, Angel Domingo Sappa
SIGOPS
2010
80views more  SIGOPS 2010»
14 years 10 months ago
Mining dependency in distributed systems through unstructured logs analysis
Dependencies among system components are crucial to locating root errors in a distributed system. In this paper, we propose an approach to mine intercomponent dependencies from un...
Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li
PLDI
2009
ACM
15 years 6 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
JSAC
2006
172views more  JSAC 2006»
14 years 11 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
328
Voted
ICSE
2012
IEEE-ACM
13 years 2 months ago
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE
—As smartphones become popular, manufacturers such as Samsung Electronics are developing smartphones with rich functionality such as a camera and photo editing quickly, which acc...
Yunho Kim, Moonzoo Kim, Young Joo Kim, Yoonkyu Jan...