Sciweavers

1056 search results - page 32 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ISSTA
2012
ACM
11 years 10 months ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
TKDE
2012
250views Formal Methods» more  TKDE 2012»
11 years 10 months ago
Dense Subgraph Extraction with Application to Community Detection
— This paper presents a method for identifying a set of dense subgraphs of a given sparse graph. Within the main applications of this “dense subgraph problem”, the dense subg...
Jie Chen 0007, Yousef Saad
ICAS
2008
IEEE
151views Robotics» more  ICAS 2008»
14 years 2 months ago
A Transformational Approach for Pattern-Based Design of User Interfaces
A pattern-based approach to user interface development is presented that is explicitly based on artifacts contained in a task and a domain models. Exploiting a task model or a dom...
Costin Pribeanu, Jean Vanderdonckt
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 7 months ago
Symmetry within Solutions
We define the concept of an internal symmetry. This is a symmety within a solution of a constraint satisfaction problem. We compare this to solution symmetry, which is a mapping b...
Marijn Heule, Toby Walsh
BMCBI
2011
12 years 11 months ago
HomPPI: A Class of Sequence Homology Based Protein-Protein Interface Prediction Methods
Background: Although homology-based methods are among the most widely used methods for predicting the structure and function of proteins, the question as to whether interface sequ...
Li C. Xue, Drena Dobbs, Vasant Honavar