Sciweavers

1433 search results - page 280 / 287
» An approach to detecting failures automatically
Sort
View
TSE
2008
236views more  TSE 2008»
13 years 9 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...
MVA
1998
162views Computer Vision» more  MVA 1998»
13 years 9 months ago
Multipass hierarchical stereo matching for generation of digital terrain models from aerial images
Abstract. This paper presents a new multi-pass hierarchical stereo-matching approach for generation of digital terrain models (DTMs) from two overlapping aerial images. Our method ...
Yi-Ping Hung, Chu-Song Chen, Kuan-Chung Hung, Yong...
SIGSOFT
2010
ACM
13 years 7 months ago
Scalable SMT-based verification of GPU kernel functions
Interest in Graphical Processing Units (GPUs) is skyrocketing due to their potential to yield spectacular performance on many important computing applications. Unfortunately, writ...
Guodong Li, Ganesh Gopalakrishnan
CLEF
2009
Springer
13 years 7 months ago
Overview of VideoCLEF 2009: New Perspectives on Speech-Based Multimedia Content Enrichment
VideoCLEF 2009 offered three tasks related to enriching video content for improved multimedia access in a multilingual environment. For each task, video data (Dutch-language telev...
Martha Larson, Eamonn Newman, Gareth J. F. Jones
INFSOF
2011
176views more  INFSOF 2011»
13 years 4 months ago
Testing in Service Oriented Architectures with dynamic binding: A mapping study
Context: Service Oriented Architectures (SOA) have emerged as a new paradigm to develop interoperable and highly dynamic applications. Objective: This paper aims to identify the s...
Marcos Palacios, José García-Fanjul,...