Sciweavers

ASPLOS
2012
ACM
12 years 7 months ago
Applying transactional memory to concurrency bugs
Multithreaded programs often suffer from synchronization bugs such as atomicity violations and deadlocks. These bugs arise from complicated locking strategies and ad hoc synchroni...
Haris Volos, Andres Jaan Tack, Michael M. Swift, S...
CCS
2011
ACM
12 years 11 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
ISBI
2006
IEEE
15 years 4 days ago
Closed and open source neuroimage analysis tools and libraries at UNC
The emergence of open-source libraries and development tools in the last decade has changed the process of academic software development in many ways. In medical image processing ...
Martin Andreas Styner, Matthieu Jomier, Guido Geri...