Sciweavers

2018 search results - page 188 / 404
» Code Normal Forms
Sort
View
ICSE
2012
IEEE-ACM
13 years 5 months ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer
CVPR
1996
IEEE
1457views Computer Vision» more  CVPR 1996»
16 years 5 months ago
Edge Detection and Ridge Detection with Automatic Scale Selection
When computing descriptors of image data, the type of information that can be extracted may be strongly dependent on the scales at which the image operators are applied. This arti...
Tony Lindeberg
VLSID
2001
IEEE
164views VLSI» more  VLSID 2001»
16 years 3 months ago
An Efficient Parallel Transparent Bist Method For Multiple Embedded Memory Buffers
In this paper, we propose a new transparent built-in self-test ( TBIST ) method to test multiple embedded memory arrays with various sizes in parallel. First, a new transparent tes...
Der-Cheng Huang, Wen-Ben Jone, Sunil R. Das
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
SIGCOMM
2006
ACM
15 years 9 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...