Sciweavers

1344 search results - page 108 / 269
» Automatic performance analysis with periscope
Sort
View
CONCURRENCY
2007
95views more  CONCURRENCY 2007»
15 years 1 months ago
Automated and accurate cache behavior analysis for codes with irregular access patterns
Abstract. The memory hierarchy plays an essential role in the performance of current computers, thus good analysis tools that help predict and understand its behavior are required....
Diego Andrade, Manuel Arenaz, Basilio B. Fraguela,...
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
15 years 1 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
TCSV
2008
153views more  TCSV 2008»
15 years 1 months ago
Broadcast Court-Net Sports Video Analysis Using Fast 3-D Camera Modeling
This paper addresses the automatic analysis of court-net sports video content. We extract information about the players, the playing-field in a bottom-up way until we reach scene-l...
Jungong Han, Dirk Farin, Peter H. N. de With
TIFS
2010
127views more  TIFS 2010»
14 years 12 months ago
Audio authenticity: detecting ENF discontinuity with high precision phase analysis
—This paper addresses a forensic tool used to assess audio authenticity. The proposed method is based on detecting phase discontinuity of the power grid signal; this signal, refe...
Daniel Patricio Nicolalde Rodríguez, Jos&ea...
BMVC
2010
14 years 11 months ago
Person Identification using Shadow Analysis
We introduce a novel person identification method for a surveillance system of much wider area than conventional systems using CCTV cameras. In the proposed system, we install cam...
Yumi Iwashita, Adrian Stoica, Ryo Kurazume