Sciweavers

3895 search results - page 611 / 779
» Parametric Feature Detection
Sort
View
JOT
2002
52views more  JOT 2002»
15 years 4 months ago
Negotiable Interfaces for Components
es are extended with a factorable, abstract state, and methods of interfaces are extended with state transformation behaviours. A new programming language command, the USE statemen...
Simon D. Kent, Chris Ho-Stuart, Paul Roe
SP
2002
IEEE
106views Security Privacy» more  SP 2002»
15 years 4 months ago
Using Programmer-Written Compiler Extensions to Catch Security Holes
This paper shows how system-speci c static analysis can nd security errors that violate rules such as \integers from untrusted sources must be sanitized before use" and \do n...
Ken Ashcraft, Dawson R. Engler
PAMI
2007
131views more  PAMI 2007»
15 years 3 months ago
The Gray-Code Filter Kernels
—In this paper, we introduce a family of filter kernels—the Gray-Code Kernels (GCK) and demonstrate their use in image analysis. Filtering an image with a sequence of Gray-Code...
Gil Ben-Artzi, Hagit Hel-Or, Yacov Hel-Or
ISSRE
2010
IEEE
15 years 2 months ago
Change Bursts as Defect Predictors
—In software development, every change induces a risk. What happens if code changes again and again in some period of time? In an empirical study on Windows Vista, we found that ...
Nachiappan Nagappan, Andreas Zeller, Thomas Zimmer...
RR
2010
Springer
15 years 2 months ago
Redundancy Elimination on RDF Graphs in the Presence of Rules, Constraints, and Queries
Based on practical observations on rule-based inference on RDF data, we study the problem of redundancy elimination on RDF graphs in the presence of rules (in the form of Datalog r...
Reinhard Pichler, Axel Polleres, Sebastian Skritek...