Sciweavers

1636 search results - page 104 / 328
» Detecting similar software applications
Sort
View
170
Voted
PAMI
2012
13 years 7 months ago
Quantifying and Transferring Contextual Information in Object Detection
— Context is critical for reducing the uncertainty in object detection. However, context modelling is challenging because there are often many different types of contextual infor...
Wei-Shi Zheng, Shaogang Gong, Tao Xiang
ISESE
2002
IEEE
15 years 9 months ago
Conducting Realistic Experiments in Software Engineering
An important goal of most empirical software engineering research is the transfer of research results to industrial applications. Two important obstacles for this transfer are the...
Dag I. K. Sjøberg, Bente Anda, Erik Arishol...
ASPLOS
2004
ACM
15 years 10 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
137
Voted
CCS
2007
ACM
15 years 10 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
143
Voted
BMCBI
2007
158views more  BMCBI 2007»
15 years 4 months ago
MetaLook: a 3D visualisation software for marine ecological genomics
Background: Marine ecological genomics can be defined as the application of genomic sciences to understand the structure and function of marine ecosystems. In this field of resear...
Thierry Lombardot, Renzo Kottmann, Gregory Giulian...