Sciweavers

8636 search results - page 1360 / 1728
» How Developers Copy
Sort
View
CRITIS
2007
15 years 6 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
FM
2008
Springer
192views Formal Methods» more  FM 2008»
15 years 6 months ago
CoVaC: Compiler Validation by Program Analysis of the Cross-Product
Abstract. The paper presents a deductive framework for proving program equivalence and its application to automatic verification of transformations performed by optimizing compiler...
Anna Zaks, Amir Pnueli
FM
2008
Springer
137views Formal Methods» more  FM 2008»
15 years 6 months ago
JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity
Abstract. The Java Modeling Language (JML) recently switched to an assertion semantics based on "strong validity" in which an assertion is taken to be valid precisely whe...
Patrice Chalin, Frédéric Rioux
ISPD
2007
ACM
99views Hardware» more  ISPD 2007»
15 years 6 months ago
Minimal skew clock embedding considering time variant temperature gradient
The existing temperature-aware clock embedding assumes a time-invariant temperature gradient. However, it is not solved how to find the worst-case temperature gradient leading to...
Hao Yu, Yu Hu, Chunchen Liu, Lei He
BCS
2008
15 years 6 months ago
On Using Physical Analogies for Feature and Shape Extraction in Computer Vision
: There is a rich literature of approaches to image feature extraction in computer vision. Many sophisticated approaches exist for low- and high-level feature extraction but can be...
Mark S. Nixon, Cem Direkoglu, Xin U. Liu, David J....
« Prev « First page 1360 / 1728 Last » Next »