Sciweavers

21319 search results - page 4260 / 4264
» An Approach for Method Reengineering
Sort
View
CCS
2011
ACM
12 years 9 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
CCS
2011
ACM
12 years 9 months ago
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications
We empirically analyzed sanitizer use in a shipping web application with over 400,000 lines of code and over 23,244 methods, the largest empirical analysis of sanitizer use of whi...
Prateek Saxena, David Molnar, Benjamin Livshits
EMSOFT
2011
Springer
12 years 9 months ago
Model-checking behavioral programs
System specifications are often structured as collections of scenarios and use-cases that describe desired and forbidden sequences of events. A recently proposed behavioral progr...
David Harel, Robby Lampert, Assaf Marron, Gera Wei...

Publication
197views
12 years 5 months ago
Convex non-negative matrix factorization for massive datasets
Non-negative matrix factorization (NMF) has become a standard tool in data mining, information retrieval, and signal processing. It is used to factorize a non-negative data matrix ...
C. Thurau, K. Kersting, M. Wahabzada, and C. Bauck...
CAD
2012
Springer
12 years 5 months ago
Flexible shape control for automatic resizing of apparel products
We provide a flexible shape control technique in this paper for the automatic resizing of apparel products. The automatic resizing function has become an essential part of the 3D...
Yuwei Meng, Charlie C. L. Wang, Xiaogang Jin
« Prev « First page 4260 / 4264 Last » Next »