Sciweavers

318 search results - page 52 / 64
» Using Memory Errors to Attack a Virtual Machine
Sort
View
BMCBI
2007
144views more  BMCBI 2007»
13 years 8 months ago
Automatic delineation of malignancy in histopathological head and neck slides
Background: Histopathology, which is one of the most important routines of all laboratory procedures used in pathology, is decisive for the diagnosis of cancer. Experienced histop...
Mutlu Mete, Xiaowei Xu, Chun-Yang Fan, Gal Shafirs...
APLAS
2004
ACM
14 years 2 months ago
Detecting Software Defects in Telecom Applications Through Lightweight Static Analysis: A War Story
In safety-critical and high-reliability systems, software development and maintenance are costly endeavors. The cost can be reduced if software errors can be identified through au...
Tobias Lindahl, Konstantinos F. Sagonas
CJ
2000
101views more  CJ 2000»
13 years 8 months ago
Safe Structural Conformance for Java
In Java, an interface specifies public abstract methods and associated public constants. Conformance of a class to an interface is by name. We propose to allow structural conforma...
Konstantin Läufer, Gerald Baumgartner, Vincen...
ISCA
2008
IEEE
139views Hardware» more  ISCA 2008»
14 years 3 months ago
Atom-Aid: Detecting and Surviving Atomicity Violations
Writing shared-memory parallel programs is error-prone. Among the concurrency errors that programmers often face are atomicity violations, which are especially challenging. They h...
Brandon Lucia, Joseph Devietti, Karin Strauss, Lui...
CIVR
2009
Springer
174views Image Analysis» more  CIVR 2009»
14 years 3 months ago
Evaluation of GIST descriptors for web-scale image search
The GIST descriptor has recently received increasing attention in the context of scene recognition. In this paper we evaluate the search accuracy and complexity of the global GIST...
Matthijs Douze, Herve Jegou, Harsimrat Sandhawalia...