The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Can we discover common object shapes within unlabeled
multi-category collections of images? While often a critical
cue at the category-level, contour matches can be difficult
to...
Yong Jae Lee (University of Texas at Austin), Kris...
Active learning strategies can be useful when manual labeling
effort is scarce, as they select the most informative
examples to be annotated first. However, for visual category
...
Sudheendra Vijayanarasimhan (University of Texas a...
In this paper we present a method for learning classspecific
features for recognition. Recently a greedy layerwise
procedure was proposed to initialize weights of deep
belief ne...
Mohammad Norouzi (Simon Fraser University), Mani R...