Sciweavers

959 search results - page 61 / 192
» On the implementation of automatic differentiation tools
Sort
View
FMOODS
2008
13 years 9 months ago
VeriCool: An Automatic Verifier for a Concurrent Object-Oriented Language
Reasoning about object-oriented programs is hard, due to , dynamic binding and the need for data abstraction and framing. Reasoning about concurrent object-oriented programs is eve...
Jan Smans, Bart Jacobs 0002, Frank Piessens
WCET
2007
13 years 8 months ago
Automatic Amortised Worst-Case Execution Time Analysis
Our research focuses on formally bounded WCET analysis, where we aim to provide absolute guarantees on execution time bounds. In this paper, we describe how amortisation can be us...
Christoph A. Herrmann, Armelle Bonenfant, Kevin Ha...
CCS
2010
ACM
13 years 6 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
CVPR
2007
IEEE
14 years 9 months ago
Real-time Automatic Deceit Detection from Involuntary Facial Expressions
Being the most broadly used tool for deceit measurement, the polygraph is a limited method as it suffers from human operator subjectivity and the fact that target subjects are awa...
Zhi Zhang, Vartika Singh, Thomas E. Slowe, Sergey ...
ACSAC
2008
IEEE
14 years 2 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode