Sciweavers

3206 search results - page 541 / 642
» How minds can be computational systems
Sort
View
POPL
2009
ACM
15 years 10 months ago
Modular code generation from synchronous block diagrams: modularity vs. code size
We study modular, automatic code generation from hierarchical block diagrams with synchronous semantics. Such diagrams are the fundamental model behind widespread tools in the emb...
Roberto Lublinerman, Christian Szegedy, Stavros Tr...
IH
2007
Springer
15 years 4 months ago
Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction
Abstract. Hard decisions constitute the major problem in digital watermarking applications, especially when content adaptive embedding methods are used. Soft-decision decoding, on ...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
SIGCOMM
2006
ACM
15 years 3 months ago
A measurement study on the impact of routing events on end-to-end internet path performance
Extensive measurement studies have shown that end-to-end Internet path performance degradation is correlated with routing dynamics. However, the root cause of the correlation betw...
Feng Wang, Zhuoqing Morley Mao, Jia Wang, Lixin Ga...
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
15 years 3 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun