Sciweavers

4307 search results - page 519 / 862
» Dynamic Spyware Analysis
Sort
View
COSPS
2001
Springer
15 years 8 months ago
Automatic Array Privatization
Abstract. Array privatization is one of the most e ective transformations for the exploitation of parallelism. In this paper, we present a technique for automatic array privatizati...
Peng Tu, David A. Padua
OOPSLA
1999
Springer
15 years 8 months ago
Removing Unnecessary Synchronization in Java
Java programs perform many synchronization operations on data structures. Some of these synchronizations are unnecessary; in particular, if an object is reachable only by a single ...
Jeff Bogda, Urs Hölzle
PPDP
1999
Springer
15 years 8 months ago
Localizing and Explaining Reasons for Non-terminating Logic Programs with Failure-Slices
We present a slicing approach for analyzing logic programs with respect to non-termination. The notion of a failure-slice is presented which is an executable reduced fragment of th...
Ulrich Neumerkel, Frédéric Mesnard
FC
1998
Springer
156views Cryptology» more  FC 1998»
15 years 8 months ago
Assessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the imp...
Kazuo J. Ezawa, Gregory Napiorkowski
CAIP
1997
Springer
178views Image Analysis» more  CAIP 1997»
15 years 8 months ago
Automated Camera Calibration and 3D Egomotion Estimation for Augmented Reality Applications
This paper addresses the problem of accurately tracking the 3D motion of a monocular camera in a known 3D environment and dynamically estimating the 3D camera location. For that pu...
Dieter Koller, Gudrun Klinker, Eric Rose, David E....