Sciweavers

318 search results - page 3 / 64
» An Experimental Ambiguity Detection Tool
Sort
View
BROADNETS
2007
IEEE
14 years 1 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
C3S2E
2008
ACM
13 years 9 months ago
Towards a mutation-based automatic framework for evaluating code clone detection tools
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
Chanchal Kumar Roy, James R. Cordy
COMSWARE
2006
IEEE
14 years 1 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
CCGRID
2001
IEEE
13 years 10 months ago
NwsAlarm: A Tool for Accurately Detecting Resource Performance Degradation
End-users of high-performance computing resources have come to expect that consistent levels of performance be delivered to their applications. The advancement of the Computationa...
Chandra Krintz, Richard Wolski
BMCV
2000
Springer
13 years 11 months ago
The Role of Natural Image Statistics in Biological Motion Estimation
While a great deal of experimental evidence supports the Reichardt correlator as a mechanism for biological motion detection, the correlator does not signal true image velocity. Th...
Ron O. Dror, David C. O'Carroll, Simon B. Laughlin