Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
We consider the problem of extracting, manipulating, and managing biological pathways, especially protein-protein interaction pathways. We discuss here the Protein Interaction Ext...
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
We propose a method for multi-object segmentation in a projection plane. Our algorithm requires a stereo camera system called Subtraction Stereo, which extracts foreground informa...
Abstract. This paper describes a framework for analyzing video sequences of a driver and determining his level of attention. The proposed system deals with the computation of eyeli...