Sciweavers

166 search results - page 22 / 34
» Mathematical programming approaches for generating p-efficie...
Sort
View
POPL
2006
ACM
14 years 8 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
BMCBI
2005
103views more  BMCBI 2005»
13 years 7 months ago
Many accurate small-discriminatory feature subsets exist in microarray transcript data: biomarker discovery
Background: Molecular profiling generates abundance measurements for thousands of gene transcripts in biological samples such as normal and tumor tissues (data points). Given such...
Leslie Grate
ENTCS
2006
107views more  ENTCS 2006»
13 years 8 months ago
Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting
This paper presents a novel profiling approach, which is entirely based on program transformation techniques in order to enable exact profiling, preserving complete call stacks, m...
Walter Binder, Jarle Hulaas
ITNG
2008
IEEE
14 years 2 months ago
Combinatorial Test Case Selection with Markovian Usage Models
A method of using Markov chain techniques for combinatorial test case selection is presented. The method can be used for statistical and coverage testing of many software programs...
Sergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poor...
ICVS
2003
Springer
14 years 1 months ago
The Imalab Method for Vision Systems
We propose a method to construct computer vision systems using a workbench composed of a multi-faceted toolbox and a general purpose kernel. The toolbox is composed of an open set ...
Augustin Lux