Sciweavers

1965 search results - page 184 / 393
» On the analysis of interacting pushdown systems
Sort
View
SIGSOFT
2003
ACM
14 years 11 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
SACMAT
2009
ACM
14 years 4 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
PE
2010
Springer
114views Optimization» more  PE 2010»
13 years 8 months ago
Analysis of scheduling policies under correlated job sizes
Correlations in traffic patterns are an important facet of the workloads faced by real systems, and one that has far-reaching consequences on the performance and optimization of t...
Varun Gupta, Michelle Burroughs, Mor Harchol-Balte...
ICMCS
2005
IEEE
97views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Visual/Acoustic Emotion Recognition
To recognize and understand a person’s emotion has been known as one of the most important issue in human-computer interaction. In this paper, we present a multimodal system tha...
Cheng-Yao Chen, Yue-Kai Huang, Perry Cook
MICCAI
2003
Springer
14 years 11 months ago
Analysis Tool for Diffusion Tensor MRI
Abstract. Diffusion Tensor Imaging (DTI) is becoming a routine magnetic resonance technique to study white matter properties and alterations of fiber integrity due to pathology. Th...
Pierre Fillard, Guido Gerig