Sciweavers

533 search results - page 90 / 107
» Control flow based obfuscation
Sort
View
CVPR
2008
IEEE
16 years 1 months ago
The Kneed Walker for human pose tracking
The Kneed Walker is a physics-based model derived from a planar biomechanical characterization of human locomotion. By controlling torques at the knees, hips and torso, the model ...
Marcus A. Brubaker, David J. Fleet
DAC
2003
ACM
16 years 20 days ago
Accurate timing analysis by modeling caches, speculation and their interaction
Schedulability analysis of real-time embedded systems requires worst case timing guarantees of embedded software performance. This involves not only language level program analysi...
Xianfeng Li, Tulika Mitra, Abhik Roychoudhury
ICSE
2009
IEEE-ACM
16 years 15 days ago
Analyzing critical process models through behavior model synthesis
Process models capture tasks performed by agents together with their control flow. Building and analyzing such models is important but difficult in certain areas such as safety-cr...
Christophe Damas, Bernard Lambeau, Francois Roucou...
ICDE
2007
IEEE
129views Database» more  ICDE 2007»
15 years 6 months ago
Ontology-driven Rule Generalization and Categorization for Market Data
—Radio Frequency Identification (RFID) is an emerging technique that can significantly enhance supply chain processes and deliver customer service improvements. RFID provides use...
Dongwoo Won, Dennis McLeod
102
Voted
HPCC
2007
Springer
15 years 5 months ago
Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks
Due to dense deployment and innumerable amount of traffic flow in wireless sensor networks (WSNs), congestion becomes more common phenomenon from simple periodic traffic to unpredi...
Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abd...