Sciweavers

2392 search results - page 141 / 479
» Performance modeling from software components
Sort
View
ICSE
2005
IEEE-ACM
16 years 2 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
117
Voted
ICCS
2004
Springer
15 years 7 months ago
Improving Generalization Level in UML Models Iterative Cross Generalization in Practice
FCA has been successfully applied to software engineering tasks such as source code analysis and class hierarchy re-organization. Most notably, FCA hematics behind the mechanism of...
Michel Dao, Marianne Huchard, Mohamed Rouane Hacen...
ICDAR
2009
IEEE
15 years 9 months ago
Enhanced Text Extraction from Arabic Degraded Document Images Using EM Algorithm
This paper presents a new enhanced text extraction algorithm from degraded document images on the basis of the probabilistic models. The observed document image is considered as a...
Wafa Boussellaa, Aymen Bougacha, Abderrazak Zahour...
MOC
2010
14 years 9 months ago
Multigrid in a weighted space arising from axisymmetric electromagnetics
Consider the space of two dimensional vector functions whose components and curl are square integrable with respect to the degenerate weight given by the radial variable. This spac...
Dylan M. Copeland, Jayadeep Gopalakrishnan, Minah ...
113
Voted
IWSAS
2001
Springer
15 years 6 months ago
Model-Based Diagnosis for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attack. Successful attacks on these systems can lead to catastrophic results; the sur...
Howard E. Shrobe