Sciweavers

5482 search results - page 1082 / 1097
» Logic Programming and Databases
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SIGGRAPH
1993
ACM
13 years 11 months ago
Global visibility algorithms for illumination computations
The most expensive geometric operation in image synthesis is visibility determination. Classically this is solved with hidden surface removal algorithms that render only the parts...
Seth J. Teller, Pat Hanrahan
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
13 years 11 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
CLEAR
2006
Springer
145views Biometrics» more  CLEAR 2006»
13 years 11 months ago
A Joint System for Single-Person 2D-Face and 3D-Head Tracking in CHIL Seminars
We present the IBM systems submitted and evaluated within the CLEAR'06 evaluation campaign for the tasks of single person visual 3D tracking (localization) and 2D face trackin...
Gerasimos Potamianos, ZhenQiu Zhang
KDD
2000
ACM
129views Data Mining» more  KDD 2000»
13 years 11 months ago
Evolutionary algorithms in data mining: multi-objective performance modeling for direct marketing
Predictive models in direct marketing seek to identify individuals most likely to respond to promotional solicitations or other intervention programs. While standard modeling appr...
Siddhartha Bhattacharyya
« Prev « First page 1082 / 1097 Last » Next »