Sciweavers

905 search results - page 146 / 181
» The Case Against Micropayments
Sort
View
MICCAI
2004
Springer
14 years 10 months ago
Profile Scale-Spaces for Multiscale Image Match
Anatomical objects often have complex and varying image appearance at different portions of the boundary; and it is frequently a challenge even to select appropriate scales at whic...
Sean Ho, Guido Gerig
SIGSOFT
2008
ACM
14 years 9 months ago
Predicting failures with developer networks and social network analysis
Software fails and fixing it is expensive. Research in failure prediction has been highly successful at modeling software failures. Few models, however, consider the key cause of ...
Andrew Meneely, Laurie Williams, Will Snipes, Jaso...
SIGSOFT
2005
ACM
14 years 9 months ago
Permissive interfaces
A modular program analysis considers components independently and provides succinct summaries for each component, which can be used when checking the rest of the system. Consider ...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar
SIGSOFT
2005
ACM
14 years 9 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
SIGSOFT
2003
ACM
14 years 9 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler