Sciweavers

96 search results - page 8 / 20
» A meeting browser evaluation test
Sort
View
ISSTA
2012
ACM
11 years 10 months ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
ICSOC
2005
Springer
14 years 1 months ago
Using Test Cases as Contract to Ensure Service Compliance Across Releases
Web Services are entailing a major shift of perspective in software engineering: software is used and not owned, and operation happens on machines that are out of the user control....
Marcello Bruno, Gerardo Canfora, Massimiliano Di P...
CLEAR
2007
Springer
154views Biometrics» more  CLEAR 2007»
14 years 1 months ago
Tsinghua Face Detection and Tracking for CLEAR 2007 Evaluation
This paper presents the algorithm and evaluation results of a face detection and tracking system. A tree-structured multi-view face detector trained by Vector Boosting is used as t...
Yuan Li, Chang Huang, Haizhou Ai
DAC
2002
ACM
14 years 8 months ago
IP delivery for FPGAs using Applets and JHDL
This paper introduces an FPGA IP evaluation and delivery system that operates within Java applets. The use of such applets allows designers to create, evaluate, test, and obtain F...
Michael J. Wirthlin, Brian McMurtrey
AMKM
2003
Springer
14 years 23 days ago
Towards Evaluation of Peer-to-Peer-Based Distributed Knowledge Management Systems
Abstract. Distributed knowledge management systems (DKMS) have been suggested to meet the requirements of today’s knowledge management. Peer-to-peer systems offer technical found...
Marc Ehrig, Christoph Schmitz, Steffen Staab, Juli...