Sciweavers

1629 search results - page 131 / 326
» Infeasible Code Detection
Sort
View
ICDAR
1997
IEEE
15 years 2 months ago
Document image similarity and equivalence detection
A hierarchical algorithm is presented for determining the similarity and equivalence of document images. Features extracted from the CCIIT fax-compressed representations of two im...
Jonathan J. Hull, John F. Cullen
ACMSE
2004
ACM
15 years 1 months ago
Methods for the prevention, detection and removal of software security vulnerabilities
Over the past decade, the need to build secure software has become a dominant goal in software development. Consequently, software researchers and practitioners have identified wa...
Jay-Evan J. Tevis, John A. Hamilton Jr.
DGCI
2009
Springer
15 years 1 months ago
A Linear Time and Space Algorithm for Detecting Path Intersection
For discrete sets coded by the Freeman chain describing their contour, several linear algorithms have been designed for determining their shape properties. Most of them are based ...
Srecko Brlek, Michel Koskas, Xavier Provenç...
GVD
2004
111views Database» more  GVD 2004»
14 years 11 months ago
Detecting Logical Errors in SQL Queries
Abstract. Checking the consistency of query conditions is an old problem, and there are already many proposed solutions. Since the problem is in general undecidable, there is not a...
Stefan Brass, Christian Goldberg
JCNS
2007
84views more  JCNS 2007»
14 years 10 months ago
Non-parametric detection of temporal order across pairwise measurements of time delays
Neuronal synchronization is often associated with small time delays, and these delays can change as a function of stimulus properties. Investigation of time delays can be cumbersom...
Danko Nikolic