Sciweavers

6960 search results - page 1260 / 1392
» Continuity Analysis of Programs
Sort
View
MM
2003
ACM
116views Multimedia» more  MM 2003»
15 years 8 months ago
Photo2Video
To exploit rich content embedded in a single photograph, a system named Photo2Video was developed to automatically convert a photographic series into a video by simulating camera ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang
SIGSOFT
2003
ACM
15 years 8 months ago
Fluent model checking for event-based systems
Model checking is an automated technique for verifying that a system satisfies a set of required properties. Such properties are typically expressed as temporal logic formulas, in...
Dimitra Giannakopoulou, Jeff Magee
CCS
2003
ACM
15 years 8 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
CP
2003
Springer
15 years 8 months ago
Using the Breakout Algorithm to Identify Hard and Unsolvable Subproblems
Abstract. Local search algorithms have been very successful for solving constraint satisfaction problems (CSP). However, a major weakness has been that local search is unable to de...
Carlos Eisenberg, Boi Faltings
EUROPAR
2003
Springer
15 years 8 months ago
Partial Redundancy Elimination with Predication Techniques
Partial redundancy elimination (PRE) techniques play an important role in optimizing compilers. Many optimizations, such as elimination of redundant expressions, communication opti...
Bernhard Scholz, Eduard Mehofer, R. Nigel Horspool
« Prev « First page 1260 / 1392 Last » Next »