Sciweavers

8177 search results - page 371 / 1636
» Detecting System Emulators
Sort
View
142
Voted
ICCHP
2010
Springer
15 years 8 months ago
Real-Time Walk Light Detection with a Mobile Phone
Crossing an urban traffic intersection is one of the most dangerous activities of a blind or visually impaired person's travel. Building on past work by the authors on the iss...
Volodymyr Ivanchenko, James Coughlan, Huiying Shen
111
Voted
ITC
2000
IEEE
101views Hardware» more  ITC 2000»
15 years 8 months ago
Which concurrent error detection scheme to choose ?
Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some ...
Subhasish Mitra, Edward J. McCluskey
106
Voted
IWPC
2000
IEEE
15 years 8 months ago
Evaluating the Accessor Classification Approach to Detect Abstract Data Types
ng the Accessor Classification Approach to Detect Abstract Data Types icle presents an approach to identify abstract data types (ADTs) in source code. For each structured type deļ...
Jean-Francois Girard, Martin Würthner
145
Voted
SC
1995
ACM
15 years 7 months ago
Detecting Coarse - Grain Parallelism Using an Interprocedural Parallelizing Compiler
This paper presents an extensive empirical evaluation of an interprocedural parallelizing compiler, developed as part of the Stanford SUIF compiler system. The system incorporates...
Mary W. Hall, Saman P. Amarasinghe, Brian R. Murph...
IMF
2007
15 years 5 months ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay