Sciweavers

1702 search results - page 199 / 341
» Doomed program points
Sort
View
MDM
2009
Springer
123views Communications» more  MDM 2009»
15 years 11 months ago
Operator Placement for Snapshot Multi-predicate Queries in Wireless Sensor Networks
— This work aims at minimize the cost of answering snapshot multi-predicate queries in high-communication-cost networks. High-communication-cost (HCC) networks is a family of net...
Georgios Chatzimilioudis, Huseyin Hakkoymaz, Nikos...
AICCSA
2008
IEEE
266views Hardware» more  AICCSA 2008»
15 years 11 months ago
A novel flow-sensitive type and effect analysis for securing C code
In this paper, we present a novel type and effect analysis for detecting type cast errors and memory errors in C source code. Our approach involves a type system with effect, regi...
Syrine Tlili, Mourad Debbabi
IFIP
2007
Springer
15 years 11 months ago
Detecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through...
Yurong Xu, Guanling Chen, James Ford, Fillia Maked...
SCIA
2007
Springer
124views Image Analysis» more  SCIA 2007»
15 years 11 months ago
Novel Stereoscopic View Generation by Image-Based Rendering Coordinated with Depth Information
Abstract. This paper describes a method of stereoscopic view generation by image-based rendering in wide outdoor environments. The stereoscopic view can be generated from an omnidi...
Maiya Hori, Masayuki Kanbara, Naokazu Yokoya
MMM
2005
Springer
115views Multimedia» more  MMM 2005»
15 years 10 months ago
Interoperability and Multimedia Archives
In distributed computing systems, it is unwise to move data to the point of program code, but instead process data at the point of storage. This concept is even more appropriate t...
Dalen Kambur, Damir Becarevic, Mark Roantree