Sciweavers

7167 search results - page 928 / 1434
» Answer Set Programming
Sort
View
MICCAI
2003
Springer
16 years 5 months ago
VETOT, Volume Estimation and Tracking Over Time: Framework and Validation
We have implemented an effective and publicly available tool, VETOT, to track and quantify the evolution of tumors and organs over time. VETOT includes a framework both for registr...
Jean-Philippe Guyon, Mark Foskey, Jisung Kim, Zeyn...
168
Voted
INFOCOM
2009
IEEE
15 years 11 months ago
Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability Analysis
— The automatic detection of failures in IP paths is an essential step for operators to perform diagnosis or for overlays to adapt. We study a scenario where a set of monitors se...
Hung Xuan Nguyen, Renata Teixeira, Patrick Thiran,...
LICS
2009
IEEE
15 years 11 months ago
Functional Reachability
—What is reachability in higher-order functional programs? We formulate reachability as a decision problem in the setting of the prototypical functional language PCF, and show th...
C.-H. Luke Ong, Nikos Tzevelekos
WADS
2009
Springer
243views Algorithms» more  WADS 2009»
15 years 11 months ago
Resolving Loads with Positive Interior Stresses
We consider the pair (pi, fi) as a force with two-dimensional direction vector fi applied at the point pi in the plane. For a given set of forces we ask for a non-crossing geometri...
Günter Rote, André Schulz
COMPSAC
2008
IEEE
15 years 11 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine