Sciweavers

2006 search results - page 130 / 402
» Heuristic Security-Testing Methods
Sort
View
PAM
2005
Springer
15 years 6 months ago
Practical Passive Lossy Link Inference
We propose a practical technique for the identification of lossy network links from end-to-end measurements. Our scheme is based on a function that computes the likelihood of each...
Alexandros Batsakis, Tanu Malik, Andreas Terzis
102
Voted
GD
2005
Springer
15 years 6 months ago
Non-planar Core Reduction of Graphs
We present a reduction method that reduces a graph to a smaller core graph which behaves invariant with respect to planarity measures like crossing number, skewness, and thickness....
Carsten Gutwenger, Markus Chimani
102
Voted
AISC
2004
Springer
15 years 6 months ago
A Decision Procedure for Equality Logic with Uninterpreted Functions
The equality logic with uninterpreted functions (EUF) has been proposed for processor verification. A procedure for proving satisfiability of formulas in this logic is introduced...
Olga Tveretina
103
Voted
ISMDA
2004
Springer
15 years 6 months ago
A New Approach to Automatic Segmentation of Bone in Medical Magnetic Resonance Imaging
This paper presents the modelling and segmentation with correction of inhomogeneity in magnetic resonance imaging of shoulder. For that purpose a new heuristic is proposed using a ...
Gabriela Pérez, Raquel Montes Diez, Juan An...
139
Voted
FPL
2003
Springer
130views Hardware» more  FPL 2003»
15 years 6 months ago
Communication Costs Driven Design Space Exploration for Reconfigurable Architectures
In this paper we propose a design space exploration method targeting reconfigurable architectures that takes place at the algorithmic level and aims to rapidly highlight architect...
Lilian Bossuet, Guy Gogniat, Jean Luc Philippe