Sciweavers

1489 search results - page 223 / 298
» The First Bug Report
Sort
View
168
Voted
FASE
2011
Springer
14 years 8 months ago
Theoretical Aspects of Compositional Symbolic Execution
Given a program and an assertion in that program, determining if the assertion can fail is one of the key applications of program analysis. Symbolic execution is a well-known techn...
Dries Vanoverberghe, Frank Piessens
IEEESP
2011
14 years 8 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
135
Voted
NAR
2011
258views Computer Vision» more  NAR 2011»
14 years 7 months ago
The RNA modification database, RNAMDB: 2011 update
Since its inception in 1994, The RNA Modification Database (RNAMDB, http://rna-mdb.cas.albany. edu/RNAmods/) has served as a focal point for information pertaining to naturally oc...
William A. Cantara, Pamela F. Crain, Jef Rozenski,...
272
Voted
SIGMOD
2008
ACM
222views Database» more  SIGMOD 2008»
16 years 4 months ago
Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks
This demo presents a privacy-preserving aggregate location monitoring system, namely, TinyCasper, in which we can monitor moving objects in wireless sensor networks while preservi...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
ICCV
2011
IEEE
14 years 4 months ago
Maximizing All Margins: Pushing Face Recognition with Kernel Plurality
We present two theses in this paper: First, performance of most existing face recognition algorithms improves if instead of the whole image, smaller patches are individually class...
Ritwik Kumar, Arunava Banerjee, CISE, Univ, Baba V...