Sciweavers

962 search results - page 116 / 193
» Input validation analysis and testing
Sort
View
128
Voted
CHI
2011
ACM
14 years 6 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang
125
Voted
CSCW
2006
ACM
15 years 8 months ago
Response times in N-user replicated, centralized, and proximity-based hybrid collaboration architectures
We evaluate response times, in N-user collaborations, of the popular centralized (client-server) and replicated (peer-to-peer) architectures, and a hybrid architecture in which ea...
Sasa Junuzovic, Prasun Dewan
SPIN
2009
Springer
15 years 9 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
93
Voted
ICDAR
2003
IEEE
15 years 8 months ago
A Majority Voting Scheme for Multiresolution Recognition of Handprinted Numerals
This paper proposes a simple voting scheme for off-line recognition of handprinted numerals. One of the main features of the proposed scheme is that this is not script dependent. ...
Ujjwal Bhattacharya, B. B. Chaudhuri
136
Voted
ICS
1994
Tsinghua U.
15 years 6 months ago
Evaluating automatic parallelization for efficient execution on shared-memory multiprocessors
We present a parallel code generation algorithm for complete applications and a new experimental methodology that tests the efficacy of our approach. The algorithm optimizes for d...
Kathryn S. McKinley