Sciweavers

191 search results - page 36 / 39
» Comparing Program Phase Detection Techniques
Sort
View
PLDI
2009
ACM
14 years 2 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
CSB
2002
IEEE
121views Bioinformatics» more  CSB 2002»
14 years 20 days ago
Fast and Sensitive Algorithm for Aligning ESTs to Human Genome
There is a pressing need to align growing set of expressed sequence tags (ESTs) to newly sequenced human genome. The problem is, however, complicated by the exon/intron structure ...
Jun Ogasawara, Shinichi Morishita
DSN
2007
IEEE
14 years 2 months ago
Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance
Transient faults are emerging as a critical concern in the reliability of general-purpose microprocessors. As architectural trends point towards multi-threaded multi-core designs,...
Alex Shye, Tipp Moseley, Vijay Janapa Reddi, Josep...
TCSV
2008
291views more  TCSV 2008»
13 years 7 months ago
A Statistical Video Content Recognition Method Using Invariant Features on Object Trajectories
Abstract--This work is dedicated to a statistical trajectorybased approach addressing two issues related to dynamic video content understanding: recognition of events and detection...
Alexandre Hervieu, Patrick Bouthemy, Jean-Pierre L...
DIMVA
2008
13 years 8 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar