Sciweavers

962 search results - page 113 / 193
» Input validation analysis and testing
Sort
View
121
Voted
ICDM
2008
IEEE
109views Data Mining» more  ICDM 2008»
15 years 9 months ago
Quantitative Association Analysis Using Tree Hierarchies
Association analysis arises in many important applications such as bioinformatics and business intelligence. Given a large collection of measurements over a set of samples, associ...
Feng Pan, Lynda Yang, Leonard McMillan, Fernando P...
116
Voted
CCS
2007
ACM
15 years 8 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
176
Voted
PAMI
2010
210views more  PAMI 2010»
15 years 1 months ago
Multi-Object Analysis of Volume, Pose, and Shape Using Statistical Discrimination
Abstract— One goal of statistical shape analysis is the discrimination between two populations of objects. In this paper, we present results of discriminant analysis on multi-obj...
Kevin Gorczowski, Martin Styner, Ja-Yeon Jeong, J....
WABI
2009
Springer
117views Bioinformatics» more  WABI 2009»
15 years 9 months ago
A Simulation Study Comparing Supertree and Combined Analysis Methods Using SMIDGen
Background: Supertree methods comprise one approach to reconstructing large molecular phylogenies given multi-marker datasets: trees are estimated on each marker and then combined...
M. Shel Swenson, François Barbançon,...
119
Voted
SIGSOFT
2004
ACM
15 years 8 months ago
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL
In run-time safety analysis the executions of a concurrent program are monitored and analyzed with respect to safety properties. Similar to testing, run-time analysis is quite e...
Jürgen Dingel, Hongzhi Liang