Sciweavers

1636 search results - page 82 / 328
» Detecting similar software applications
Sort
View
ICPR
2000
IEEE
15 years 8 months ago
Probabilistic Saliency Approach for Elongated Structure Detection Using Deformable Models
In this paper we address the object recognition problem in a probabilistic framework to detect and describe object appearance through image features organized by means of active c...
Xavier Orriols, Ricardo Toledo, Xavier Binefa, Pet...
ICSE
2008
IEEE-ACM
16 years 5 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
CODES
2008
IEEE
15 years 11 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...
KBSE
2010
IEEE
15 years 2 months ago
MiTV: multiple-implementation testing of user-input validators for web applications
User-input validators play an essential role in guarding a web application against application-level attacks. Hence, the security of the web application can be compromised by defe...
Kunal Taneja, Nuo Li, Madhuri R. Marri, Tao Xie, N...
ASWEC
2010
IEEE
15 years 4 months ago
Non-Monotonic Model Completion in Web Application Engineering
—Formal models are often used to verify systems and prove their correctness, and ensure that transformed models remain consistent to the original system. However, formal techniqu...
Jevon M. Wright, Jens Dietrich