—As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In ...
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng...
In the last two decades we have witnessed an impressive advance in the efficiency of propositional satisfiability techniques (SAT), which has brought large and previously-intractab...
Many approaches to active learning involve training one classifier by periodically choosing new data points about which the classifier has the least confidence, but designing a co...
Illumination change is one of most important and difficult problems which prevent from applying face recognition to real applications. For solving this, we propose a method to comp...
Particle filters have been found to be effective in tracking mobile targets in indoor environments. One frequently encountered problem in these settings occurs when the target'...