Sciweavers

1801 search results - page 34 / 361
» Pointing without a pointer
Sort
View
PODS
2005
ACM
136views Database» more  PODS 2005»
14 years 8 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
KBSE
2007
IEEE
14 years 2 months ago
Effective memory protection using dynamic tainting
Programs written in languages that provide direct access to memory through pointers often contain memory-related faults, which may cause non-deterministic failures and even securi...
James A. Clause, Ioannis Doudalis, Alessandro Orso...
JGO
2010
531views more  JGO 2010»
13 years 6 months ago
Characterizing zero-derivative points
We study smooth functions in several variables with a Lipschitz derivative. It is shown that these functions have the “envelope property”: Around zero-derivative points, and on...
Sanjo Zlobec
ICPR
2002
IEEE
14 years 23 days ago
Segmentation of Vector Fields by Critical Point Analysis: Application to Brain Deformation
MRI examinations may be used to monitor the progress of neurological disease. Arising structural changes can then be quantified using non-rigid registration procedures. However, ...
Gert Wollny, Marc Tittgemeyer, Frithjof Kruggel
CAGD
2002
69views more  CAGD 2002»
13 years 7 months ago
Adjusting control points to achieve continuity
In this paper, I discuss a method for increasing the continuity between two functional triangular polynomial patches by adjusting their control points. The method described in thi...
Stephen Mann