Sciweavers

10790 search results - page 2114 / 2158
» Using feature models to automate model transformations
Sort
View
NDSS
2007
IEEE
15 years 10 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
DIS
2007
Springer
15 years 10 months ago
A Hilbert Space Embedding for Distributions
We describe a technique for comparing distributions without the need for density estimation as an intermediate step. Our approach relies on mapping the distributions into a reprodu...
Alexander J. Smola, Arthur Gretton, Le Song, Bernh...
ECAL
2007
Springer
15 years 10 months ago
Multi-level Selection in the Emergence of Language Systematicity
Language can be viewed as a complex adaptive system which is continuously shaped and reshaped by the actions of its users as they try to solve communicative problems. To maintain c...
Luc Steels, Remi van Trijp, Pieter Wellens
119
Voted
OOPSLA
2007
Springer
15 years 10 months ago
Understanding the value of program analysis tools
It is difficult to determine the cost effectiveness of program analysis tools because we cannot evaluate them in the same environment where we will be using the tool. Tool evalua...
Ciera Jaspan, I-Chin Chen, Anoop Sharma
ICMCS
2006
IEEE
215views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Biologically vs. Logic Inspired Encoding of Facial Actions and Emotions in Video
Automatic facial expression analysis is an important aspect of Human Machine Interaction as the face is an important communicative medium. We use our face to signal interest, disa...
Michel François Valstar, Maja Pantic
« Prev « First page 2114 / 2158 Last » Next »