Sciweavers

183 search results - page 14 / 37
» Exploiting Symmetries to Test Programs
Sort
View
NDSS
2008
IEEE
14 years 3 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
CIARP
2006
Springer
13 years 10 months ago
General Pose Face Recognition Using Frontal Face Model
We present a face recognition system able to identify people from a single non-frontal image in an arbitrary pose. The key component of the system is a novel pose correction techni...
Jean-Yves Guillemaut, Josef Kittler, Mohammad Sade...
CCS
2006
ACM
14 years 10 days ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
ICS
1993
Tsinghua U.
14 years 21 days ago
Static and Dynamic Evaluation of Data Dependence Analysis
—Data dependence analysis techniques are the main component of today’s strategies for automatic detection of parallelism. Parallelism detection strategies are being incorporate...
Paul Petersen, David A. Padua
ISSTA
2004
ACM
14 years 2 months ago
Evolutionary testing of classes
Object oriented programming promotes reuse of classes in multiple contexts. Thus, a class is designed and implemented with several usage scenarios in mind, some of which possibly ...
Paolo Tonella