Sciweavers

956 search results - page 54 / 192
» Slicing Objects Using System Dependence Graphs
Sort
View
CORR
2011
Springer
205views Education» more  CORR 2011»
13 years 4 months ago
Detection of objects in noisy images and site percolation on square lattices
Abstract: We propose a novel probabilistic method for detection of objects in noisy images. The method uses results from percolation and random graph theories. We present an algori...
Mikhail A. Langovoy, Olaf Wittich
CCS
2006
ACM
14 years 1 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
ASPLOS
2008
ACM
13 years 12 months ago
Dispersing proprietary applications as benchmarks through code mutation
Industry vendors hesitate to disseminate proprietary applications to academia and third party vendors. By consequence, the benchmarking process is typically driven by standardized...
Luk Van Ertvelde, Lieven Eeckhout
AIME
2009
Springer
13 years 7 months ago
Segmentation of Lung Tumours in Positron Emission Tomography Scans: A Machine Learning Approach
Lung cancer represents the most deadly type of malignancy. In this work we propose a machine learning approach to segmenting lung tumours in Positron Emission Tomography (PET) scan...
Aliaksei Kerhet, Cormac Small, Harvey Quon, Terenc...
GI
1997
Springer
14 years 1 months ago
Persistent Object Systems: From Technology to Market
Abstract. This text describes how persistent object system technology developed in European basic research is being used by a small German startup software company to realize innov...
Andreas Gawecki, Florian Matthes, Joachim W. Schmi...