With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
Sensitivity Analysis (SA) is a novel compiler technique that complements, and integrates with, static automatic parallelization analysis for the cases when relevant program behavi...
Silvius Rus, Maikel Pennings, Lawrence Rauchwerger
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
The forces experienced while surgically cutting anatomical tissues from a sheep and two rats were investigated for three scissor types. Data were collected in situ using instrumen...
Stephanie Greenish, Vincent Hayward, Vanessa B. Ch...
We present a real-time algorithm called compensated ray marching for rendering of smoke under dynamic low-frequency environment lighting. Our approach is based on a decomposition ...
Kun Zhou, Zhong Ren, Stephen Lin, Hujun Bao, Baini...