Sciweavers

1191 search results - page 41 / 239
» Distributed Detection of Information Flows
Sort
View
131
Voted
DAC
2006
ACM
16 years 4 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...
118
Voted
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
124
Voted
ICCCN
2007
IEEE
15 years 10 months ago
Motion-based Background Modeling for Moving Object Detection on Moving Platforms
— A method to detect moving objects on non-stationary background is proposed. The concurrent motions of foreground and background pixels make it extremely difficult to maintain a...
Ming-Yu Shih, Yao-Jen Chang, Bwo-Chau Fu, Chingchu...
122
Voted
AAAI
2004
15 years 5 months ago
Visual Odometry Using Commodity Optical Flow
A wide variety of techniques for visual navigation using robot-mounted cameras have been described over the past several decades, yet adoption of optical flow navigation technique...
Jason Campbell, Rahul Sukthankar, Illah R. Nourbak...
114
Voted
BMCBI
2008
132views more  BMCBI 2008»
15 years 3 months ago
Clustering ionic flow blockade toggles with a Mixture of HMMs
Background: Ionic current blockade signal processing, for use in nanopore detection, offers a promising new way to analyze single molecule properties with potential implications f...
Alexander G. Churbanov, Stephen Winters-Hilt