Sciweavers

981 search results - page 161 / 197
» Semantics-aware trace analysis
Sort
View
DSN
2008
IEEE
15 years 3 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ECCV
2008
Springer
15 years 3 months ago
Image Segmentation in the Presence of Shadows and Highlights
The segmentation method proposed in this paper is based on the observation that a single physical reflectance can have many different image values. We call the set of all these val...
Eduard Vazquez, Joost van de Weijer, Ramon Baldric...
ECIS
2001
15 years 3 months ago
The golden circle: A case study of organizational change at the London Ambulance Service
This paper analyzes the way in which the London Ambulance Service (LAS) recovered from the events of October 1992, when it implemented a computer aided despatch system (LASCAD) th...
Kathy McGrath
WISES
2004
15 years 3 months ago
Embedded Real-Time-Tracer - An Approach with IDE
-- Debugging software that runs on highly integrated System-on-Chip devices is complicated because conventional debug tools (like traditional In-Circuit Emulators and Logic Analyze...
Babak Rahbaran, Matthias Függer, Andreas Stei...
HUC
2010
Springer
15 years 3 months ago
Bridging the gap between physical location and online social networks
This paper examines the location traces of 489 users of a location sharing social network for relationships between the users' mobility patterns and structural properties of ...
Justin Cranshaw, Eran Toch, Jason I. Hong, Aniket ...