Sciweavers

1701 search results - page 172 / 341
» Computer Science and State Machines
Sort
View
FORTE
1998
15 years 20 hour ago
Exploiting Symmetry in Protocol Testing
Test generation and execution are often hampered by the large state spaces of the systems involved. In automata (or transition system) based test algorithms, taking advantage of s...
Judi Romijn, Jan Springintveld
HCI
2009
14 years 8 months ago
Combining Electroencephalograph and Functional Near Infrared Spectroscopy to Explore Users' Mental Workload
We discuss the physiological metrics that can be measured with electroencephalography (EEG) and functional near infrared spectroscopy (fNIRs). We address the functional and practic...
Leanne M. Hirshfield, Krysta Chauncey, Rebecca Gul...
RAID
2010
Springer
14 years 8 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...

Publication
3320views
16 years 9 months ago
Image Inpainting with the Navier-Stokes Equations
Image inpaining "involves filling in part of an image (or video) using information for the surrounding area" [1]. This report summarizes an application of numerical sol...
Wilson Au, Ryo Takei

Book
3864views
16 years 9 months ago
Constrained Optimization and Lagrange Multiplier Methods
"This is an excellent reference book. The author has done a great job in at least three directions. First, he expertly, systematically and with ever-present authority guides t...
Dimitri P. Bertsekas