Sciweavers

1629 search results - page 156 / 326
» Infeasible Code Detection
Sort
View
CORR
2010
Springer
145views Education» more  CORR 2010»
14 years 10 months ago
Detection and Demarcation of Tumor using Vector Quantization in MRI images
Segmenting a MRI images into homogeneous texture regions representing disparate tissue types is often a useful preprocessing step in the computer-assisted detection of breast canc...
H. B. Kekre, Tanuja K. Sarode, Saylee M. Gharge
INFOCOM
2010
IEEE
14 years 8 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
FIW
2009
101views Communications» more  FIW 2009»
14 years 8 months ago
Feature Interaction Detection in the Feature Language Extensions
One of the most difficult tasks in software development is that features are implemented by changing the code of other features. This problem cannot be solved with existing general...
Lei Sun, Lu Zhoa, Yimeng Li, Wu-Hon F. Leung
ICSE
2008
IEEE-ACM
15 years 11 months ago
Dynamic detection of atomic-set-serializability violations
Previously we presented atomic sets, memory locations that share some consistency property, and units of work, code fragments that preserve consistency of atomic sets on which the...
Christian Hammer, Julian Dolby, Mandana Vaziri, Fr...
WWW
2009
ACM
15 years 10 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim