Sciweavers

4307 search results - page 307 / 862
» Dynamic Spyware Analysis
Sort
View
CVPR
2007
IEEE
16 years 5 months ago
3D Occlusion Inference from Silhouette Cues
We consider the problem of detecting and accounting for the presence of occluders in a 3D scene based on silhouette cues in video streams obtained from multiple, calibrated views....
Jean-Sébastien Franco, Li Guan, Marc Pollef...
AIPS
2009
15 years 4 months ago
Incremental Policy Generation for Finite-Horizon DEC-POMDPs
Solving multiagent planning problems modeled as DECPOMDPs is an important challenge. These models are often solved by using dynamic programming, but the high resource usage of cur...
Christopher Amato, Jilles Steeve Dibangoye, Shlomo...
115
Voted
HICSS
2009
IEEE
178views Biometrics» more  HICSS 2009»
15 years 10 months ago
Applying Multi-Layered Analysis Framework on the Public Sector ICT Provision: An Illustration from a Municipal Wireless Network
As technology develops, local governments are increasingly becoming involved in providing municipal wireless service. However, many obstacles exist in municipal wireless provision...
Myungjae Kwak, Thomas A. Horan, Hana Oh
SOSE
2008
IEEE
15 years 10 months ago
Towards SOA-Based Code Defect Analysis
Static code analysis is the analysis of software that is performed to acquire information concerning the dynamic behavior of programs built from that software, without actually ex...
Qianxiang Wang, Na Meng, Zhiyi Zhou, Jinhui Li, Ho...
CSREAESA
2003
15 years 5 months ago
Worst Case Execution Time Analysis for Petri Net Models of Embedded Systems
We present an approach for Worst-Case Execution Time (WCET) Analysis of embedded system software, that is generated from Petri net specifications. The presented approach is part ...
Friedhelm Stappert, Carsten Rust