Sciweavers

20 search results - page 4 / 4
» Automatic Patch-Based Exploit Generation is Possible: Techni...
Sort
View
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
13 years 11 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...
ICPP
2000
IEEE
13 years 9 months ago
Partitioning Loops with Variable Dependence Distances
A new technique to parallelize loops with variable distance vectors is presented. The method extends previous methods in two ways. First, the present method makes it possible for ...
Yijun Yu, Erik H. D'Hollander
DCC
2007
IEEE
14 years 4 months ago
Spatial Sparsity Induced Temporal Prediction for Hybrid Video Compression
In this paper we propose a new motion compensated prediction technique that enables successful predictive encoding during fades, blended scenes, temporally decorrelated noise, and...
Gang Hua, Onur G. Guleryuz
CP
2005
Springer
13 years 10 months ago
Mechanism Design for Preference Aggregation over Coalitions
The aggregation of individuals’ preferences into a single group outcome is both well-studied and fundamental within decision theory. Historically, though, a pervasive simplifica...
Eric I. Hsu, Sheila A. McIlraith
FM
2008
Springer
152views Formal Methods» more  FM 2008»
13 years 6 months ago
Constraint Prioritization for Efficient Analysis of Declarative Models
The declarative modeling language Alloy and its automatic analyzer provide an effective tool-set for building designs of systems and checking their properties. The Alloy Analyzer p...
Engin Uzuncaova, Sarfraz Khurshid