Sciweavers

1216 search results - page 132 / 244
» Hybrid type checking
Sort
View
126
Voted
PLDI
2009
ACM
15 years 10 months ago
Language-based security on Android
In this paper, we initiate a formal study of security on Android: Google’s new open-source platform for mobile devices. Specifically, we present a core typed language to descri...
Avik Chaudhuri
ICIP
2000
IEEE
15 years 8 months ago
Adaptive Target Detection Across a Clutter Boundary: GLR and Maximally Invariant Detectors
We present and compare adaptive detection algorithms developed for synthetic aperture radar (SAR) targets in structured clutter, utilizing both generalized likelihood ratio (GLR) ...
Hyung Soo Kim, Alfred O. Hero III
120
Voted
CVPR
2008
IEEE
15 years 5 months ago
Motion blur identification from image gradients
Restoration of a degraded image from motion blurring is highly dependent on the estimation of the blurring kernel. Most of the existing motion deblurring techniques model the blur...
Hui Ji, Chaoqiang Liu
SPIN
2000
Springer
15 years 7 months ago
Verification and Optimization of a PLC Control Schedule
Abstract. We report on the use of model checking techniques for both the verification of a process control program and the derivation of optimal control schedules. Most of this wor...
Ed Brinksma, Angelika Mader
MIDDLEWARE
2007
Springer
15 years 10 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh