Sciweavers

963 search results - page 29 / 193
» Escape Analysis on Lists
Sort
View
CCECE
2009
IEEE
15 years 4 months ago
Automata-based approach for kernel trace analysis
This paper presents an automata-based approach for analyzing traces generated by the kernel of an operating system. We identified a list of typical patterns of problematic behavi...
Gabriel Matni, Michel Dagenais
CRV
2006
IEEE
114views Robotics» more  CRV 2006»
15 years 3 months ago
Generic Detection of Multi-Part Objects by High-Level Analysis
A method is proposed to detect multi-part man-made or natural objects in complex images. It consists in first extracting simple curves and straight lines from the edge map. Then,...
Jean-Francois Bernier, Robert Bergevin
CAMP
2005
IEEE
15 years 3 months ago
An Intelligent and Task-Independent Controller for Video Sequence Analysis
—This paper describes a task-independent controller that allows for an easy implementation of vision systems for processing video sequences. The controller does not have a fixed ...
José Bins, Thor List, Robert B. Fisher, Dav...
TAP
2010
Springer
132views Hardware» more  TAP 2010»
15 years 2 months ago
Relational Analysis of (Co)inductive Predicates, (Co)algebraic Datatypes, and (Co)recursive Functions
This paper presents techniques for applying a finite relational model finder to logical specifications that involve (co)inductive predicates, (co)algebraic datatypes, and (co)re...
Jasmin Christian Blanchette
SACRYPT
1999
Springer
15 years 2 months ago
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator
We describe the design of Yarrow, a family of cryptographic pseudo-random number generators (PRNG). We describe the concept of a PRNG as a separate cryptographic primitive, and the...
John Kelsey, Bruce Schneier, Niels Ferguson