Sciweavers

1548 search results - page 169 / 310
» Estimating Software Vulnerabilities
Sort
View
PLDI
2009
ACM
15 years 6 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
STORAGESS
2005
ACM
15 years 5 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
AAAI
2006
15 years 1 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
PAMI
2012
13 years 2 months ago
Image Restoration by Matching Gradient Distributions
—The restoration of a blurry or noisy image is commonly performed with a MAP estimator, which maximizes a posterior probability to reconstruct a clean image from a degraded image...
Taeg Sang Cho, Charles Lawrence Zitnick, Neel Josh...
PAMI
2012
13 years 2 months ago
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual Context of Objects and Human Poses
—Detecting objects in cluttered scenes and estimating articulated human body parts from 2D images are two challenging problems in computer vision. The difficulty is particularly...
Bangpeng Yao, Fei-Fei Li