Sciweavers

2342 search results - page 353 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
133
Voted
VLSI
2007
Springer
15 years 9 months ago
Impact of hardware emulation on the verification quality improvement
— Software simulation remains the most used method for VHDL RTL functional verification. The functional verification process essentially consists of two parts. The first one is t...
Youssef Serrestou, Vincent Beroulle, Chantal Robac...
190
Voted
CVPR
2012
IEEE
13 years 6 months ago
Saliency filters: Contrast based filtering for salient region detection
Saliency estimation has become a valuable tool in image processing. Yet, existing approaches exhibit considerable variation in methodology, and it is often difficult to attribute...
Federico Perazzi, Philipp Krähenbühl, Ya...
141
Voted
ICSE
2004
IEEE-ACM
16 years 3 months ago
Finding Latent Code Errors via Machine Learning over Program Executions
This paper proposes a technique for identifying program properties that indicate errors. The technique generates machine learning models of program properties known to result from...
Yuriy Brun, Michael D. Ernst
134
Voted
ICSE
2004
IEEE-ACM
16 years 3 months ago
Efficient Decentralized Monitoring of Safety in Distributed Systems
We describe an efficient decentralized monitoring algorithm that monitors a distributed program's execution to check for violations of safety properties. The monitoring is ba...
Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Rosu
115
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...