Sciweavers

619 search results - page 101 / 124
» Coalition detection and identification
Sort
View
83
Voted
DAC
2005
ACM
15 years 4 days ago
Logic soft errors in sub-65nm technologies design and CAD challenges
Logic soft errors are radiation induced transient errors in sequential elements (flip-flops and latches) and combinational logic. Robust enterprise platforms in sub-65nm technolog...
Subhasish Mitra, Tanay Karnik, Norbert Seifert, Mi...
LREC
2010
150views Education» more  LREC 2010»
14 years 11 months ago
Wikipedia-based Approach for Linking Ontology Concepts to their Realisations in Text
A novel method to automatically associate ontological concepts to their realisations in texts is presented. The method has been developed in the context of the Papyrus project to ...
Giulio Paci, Giorgio Pedrazzi, Roberta Turra
67
Voted
DIMVA
2008
14 years 11 months ago
On Race Vulnerabilities in Web Applications
Abstract A web programmer often conceives its application as a sequential entity, thus neglecting the parallel nature of the underlying execution environment. In this environment, ...
Roberto Paleari, Davide Marrone, Danilo Bruschi, M...
IM
2007
14 years 11 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
MVA
2007
162views Computer Vision» more  MVA 2007»
14 years 11 months ago
Geometrical and Statistical Visual Inspection of Imprinted Tablets
In this paper we address automated visual inspection of tablets that may, in contrast to manual tablet sorting, provide objective and reproducible tablet quality assurance. Visual...
Marko Bukovec, Ziga Spiclin, Franjo Pernus, Bostja...