Sciweavers

32 search results - page 4 / 7
» Experimental Settings in Program Comprehension: Challenges a...
Sort
View
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 10 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
COMPSAC
2008
IEEE
14 years 2 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
SAS
2010
Springer
143views Formal Methods» more  SAS 2010»
13 years 6 months ago
Points-to Analysis as a System of Linear Equations
The efficiency of a points-to analysis is critical for several compiler optimizations and transformations, and has attracted considerable research attention. Despite several advanc...
Rupesh Nasre, Ramaswamy Govindarajan
CMPB
2004
132views more  CMPB 2004»
13 years 7 months ago
Design and implementation of software for assembly and browsing of 3D brain atlases
: Visualization software for three dimensional digital brain atlases present many challenges in design and implementation. These challenges include the design of an effective human...
Carl Gustafson, Oleh J. Tretiak, Louise Bertrand, ...
ICCAD
2002
IEEE
161views Hardware» more  ICCAD 2002»
14 years 4 months ago
Non-tree routing for reliability and yield improvement
We propose to introduce redundant interconnects for manufacturing yield and reliability improvement. By introducing redundant interconnects, the potential for open faults is reduc...
Andrew B. Kahng, Bao Liu, Ion I. Mandoiu