Sciweavers

6527 search results - page 192 / 1306
» On Typing Information Flow
Sort
View
INFSOF
2002
78views more  INFSOF 2002»
13 years 9 months ago
Flow insensitive points-to sets
Pointer analysis is an important part of source code analysis. Many programs that manipulate source code take points-to sets as part of their input. Points-to related data collect...
Paul Anderson, David Binkley, Genevieve Rosay, Tim...
ECML
2006
Springer
14 years 27 days ago
Sequence Discrimination Using Phase-Type Distributions
Abstract We propose in this paper a novel approach to the classification of discrete sequences. This approach builds a model fitting some dynamical features deduced from the learni...
Jérôme Callut, Pierre Dupont
COMSIS
2006
141views more  COMSIS 2006»
13 years 9 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
BC
1999
94views more  BC 1999»
13 years 9 months ago
Speed tuning in elementary motion detectors of the correlation type
A prominent model of visual motion detection is the so-called correlation or Reichardt detector. Whereas this model can account for many properties of motion vision, from humans to...
Johannes M. Zanker, M. V. Srinivasan, Martin Egelh...
TIT
1998
72views more  TIT 1998»
13 years 9 months ago
Runlength Limited Codes for Single Error-Detection and Single Error-Correction with Mixed Type Errors
Abstract—Runlength-limited (RLL) codes are used in magnetic recording. The error patterns that occur with peak detection magnetic recording systems when using a runlength-limited...
Patrick Perry, Mingche Li, Mao Chao Lin, Zhen Zhan...