Sciweavers

3604 search results - page 215 / 721
» All Common Subsequences
Sort
View
TLDI
2009
ACM
142views Formal Methods» more  TLDI 2009»
16 years 1 months ago
Static extraction of sound hierarchical runtime object graphs
For many object-oriented systems, it is often useful to have a runtime architecture that shows networks of communicating objects. But it is hard to statically extract runtime obje...
Marwan Abi-Antoun, Jonathan Aldrich
ARITH
2009
IEEE
15 years 12 months ago
Fully Redundant Decimal Arithmetic
Hardware implementation of all the basic radix-10 arithmetic operations is evolving as a new trend in the design and implementation of general purpose digital processors. Redundan...
Saeid Gorgin, Ghassem Jaberipur
KBSE
2009
IEEE
15 years 11 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
ICRA
2008
IEEE
140views Robotics» more  ICRA 2008»
15 years 11 months ago
Multi-robot routing under limited communication range
Abstract— Teams of mobile robots have been recently proposed as effective means of completing complex missions involving multiple tasks spatially distributed over a large area. A...
Alejandro R. Mosteo, Luis Montano, Michail G. Lago...
ICDIM
2007
IEEE
15 years 11 months ago
Several methods of ranking retrieval systems with partial relevance judgment
: Some measures such as average precision over all relevant documents and recall level precision are considered as good system-oriented measures, because they concern both precisio...
Shengli Wu, Sally I. McClean