Sciweavers

5855 search results - page 1052 / 1171
» Test generation and minimization with
Sort
View
PLDI
2009
ACM
15 years 8 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
CRV
2009
IEEE
237views Robotics» more  CRV 2009»
15 years 8 months ago
SEC: Stochastic Ensemble Consensus Approach to Unsupervised SAR Sea-Ice Segmentation
The use of synthetic aperture radar (SAR) has become an integral part of sea-ice monitoring and analysis in the polar regions. An important task in sea-ice analysis is to segment ...
Alexander Wong, David A. Clausi, Paul W. Fieguth
KBSE
2009
IEEE
15 years 8 months ago
Evaluating the Accuracy of Fault Localization Techniques
—We investigate claims and assumptions made in several recent papers about fault localization (FL) techniques. Most of these claims have to do with evaluating FL accuracy. Our in...
Shaimaa Ali, James H. Andrews, Tamilselvi Dhandapa...
ISSTA
2009
ACM
15 years 8 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
SOUPS
2009
ACM
15 years 8 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi
« Prev « First page 1052 / 1171 Last » Next »