Sciweavers

5235 search results - page 911 / 1047
» Analysis of Multithreaded Programs
Sort
View
DOCENG
2003
ACM
15 years 10 months ago
XPath on left and right sides of rules: toward compact XML tree rewriting through node patterns
XPath [3, 5] is a powerful and quite successful language able to perform complex node selection in trees through compact specifications. As such, it plays a growing role in many ...
Jean-Yves Vion-Dury
MM
2003
ACM
116views Multimedia» more  MM 2003»
15 years 10 months ago
Photo2Video
To exploit rich content embedded in a single photograph, a system named Photo2Video was developed to automatically convert a photographic series into a video by simulating camera ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang
SIGSOFT
2003
ACM
15 years 10 months ago
Fluent model checking for event-based systems
Model checking is an automated technique for verifying that a system satisfies a set of required properties. Such properties are typically expressed as temporal logic formulas, in...
Dimitra Giannakopoulou, Jeff Magee
CCS
2003
ACM
15 years 10 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
157
Voted
CP
2003
Springer
15 years 10 months ago
Using the Breakout Algorithm to Identify Hard and Unsolvable Subproblems
Abstract. Local search algorithms have been very successful for solving constraint satisfaction problems (CSP). However, a major weakness has been that local search is unable to de...
Carlos Eisenberg, Boi Faltings