Sciweavers

592 search results - page 92 / 119
» Static analysis of XML processing with data values
Sort
View
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
VMV
2003
145views Visualization» more  VMV 2003»
13 years 9 months ago
Interactive Volume Visualization of Complex Flow Semantics
Comprehending results from 3D CFD simulation is a difficult task. In this paper, we present a semantics-based approach to featurebased volume rendering of 3D flow data. We make ...
Helwig Hauser, Matej Mlejnek
ICIP
2005
IEEE
14 years 1 months ago
Graph cut based segmentation of convoluted objects
Fundamental to any graph cut segmentation methods is the assignment of edge weights. The existing solutions typically use gaussian, exponential or rectangular cost functions with ...
Alex Yong Sang Chia, Vitali Zagorodnov
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
14 years 1 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
ESOP
2009
Springer
14 years 2 months ago
Practical Variable-Arity Polymorphism
Just as some functions have uniform behavior over distinct types, other functions have uniform behavior over distinct arities. These variable-arity functions are widely used in scr...
T. Stephen Strickland, Sam Tobin-Hochstadt, Matthi...