Sciweavers

2450 search results - page 349 / 490
» Exploring Unknown Environments
Sort
View
MM
2000
ACM
105views Multimedia» more  MM 2000»
15 years 8 months ago
Smart rebinning for compression of concentric mosaics
Concentric mosaics offer a quick solution to construct a virtual copy of a real environment, and navigate in the virtual environment. However, the huge amount of data associated w...
Yunnan Wu, Cha Zhang, Jin Li, Jizheng Xu
SIGSOFT
2000
ACM
15 years 8 months ago
Extracting library-based object-oriented applications
In an increasingly popular model of software distribution, software is developed in one computing environment and deployed in other environments by transfer over the internet. Ext...
Peter F. Sweeney, Frank Tip
CAV
2000
Springer
97views Hardware» more  CAV 2000»
15 years 8 months ago
Detecting Errors Before Reaching Them
Abstract. Any formalmethodor tool is almostcertainlymoreoftenapplied in situationswheretheoutcomeis failure(acounterexample)rather than success (a correctness proof). We present a ...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...
IEEEARES
2010
IEEE
15 years 8 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
IDA
1999
Springer
15 years 8 months ago
Knowledge-Based Visualization to Support Spatial Data Mining
Data mining methods are designed for revealing significant relationships and regularities in data collections. Regarding spatially referenced data, analysis by means of data minin...
Gennady L. Andrienko, Natalia V. Andrienko