Sciweavers

2259 search results - page 381 / 452
» Separation and information hiding
Sort
View
ISSTA
2012
ACM
12 years 13 days ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
CVPR
1998
IEEE
15 years 8 hour ago
Subtly Different Facial Expression Recognition and Expression Intensity Estimation
We have developed a computer vision system, including both facial feature extraction and recognition, that automatically discriminates among subtly different facial expressions. E...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...
ICDE
2006
IEEE
204views Database» more  ICDE 2006»
14 years 11 months ago
Collaborative Business Process Support in IHE XDS through ebXML Business Processes
Currently, clinical information is stored in all kinds of proprietary formats through a multitude of medical information systems available on the market. This results in a severe ...
Asuman Dogac, Veli Bicer, Alper Okcan
ICSE
2008
IEEE-ACM
14 years 10 months ago
Answering conceptual queries with Ferret
Programmers seek to answer questions as they investigate the functioning of a software system, such as "which execution path is being taken in this case?" Programmers at...
Brian de Alwis, Gail C. Murphy
KDD
2007
ACM
186views Data Mining» more  KDD 2007»
14 years 10 months ago
Content-based document routing and index partitioning for scalable similarity-based searches in a large corpus
We present a document routing and index partitioning scheme for scalable similarity-based search of documents in a large corpus. We consider the case when similarity-based search ...
Deepavali Bhagwat, Kave Eshghi, Pankaj Mehra