Sciweavers

114 search results - page 14 / 23
» Using Verification Technology to Specify and Detect Malware
Sort
View
WWW
2010
ACM
14 years 27 days ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
GIL
2007
13 years 9 months ago
Use of vegetation indices to detect plant diseases
: Today’s agriculture is not only confronted with the production of food and animal food, but also with aspects of environmental protection. In today’s crop production, there i...
Kerstin Gröll, Simone Graeff, Wilhelm Claupei...
OOPSLA
2010
Springer
13 years 5 months ago
Composable specifications for structured shared-memory communication
In this paper we propose a communication-centric approach to specifying and checking how multithreaded programs use shared memory to perform inter-thread communication. Our approa...
Benjamin P. Wood, Adrian Sampson, Luis Ceze, Dan G...
CORR
2009
Springer
242views Education» more  CORR 2009»
13 years 5 months ago
Adaptive Scheduling of Data Paths using Uppaal Tiga
Abstract. We apply Uppaal Tiga to automatically compute adaptive scheduling strategies for an industrial case study dealing with a state-of-the-art image processing pipeline of a p...
Israa AlAttili, Fred Houben, Georgeta Igna, Steffe...
SIGIR
2005
ACM
14 years 1 months ago
Noun sense induction using web search results
This paper presents an algorithm for unsupervised noun sense induction, based on clustering of Web search results. The algorithm does not utilize labeled training instances or any...
Goldee Udani, Shachi Dave, Anthony Davis, Tim Sibl...