Sciweavers

1629 search results - page 106 / 326
» Infeasible Code Detection
Sort
View
CASES
2005
ACM
14 years 12 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
ICIP
2003
IEEE
15 years 11 months ago
Improved fingercode for filterbank-based fingerprint matching
FingerCode has been shown to be an effective representation to capture both the local and global information in a fingerprint. However, the performance of FingerCode is influenced...
Lifeng Sha, Feng Zhao, Xiaoou Tang
FGR
2006
IEEE
175views Biometrics» more  FGR 2006»
15 years 4 months ago
Fully Automatic Facial Action Recognition in Spontaneous Behavior
We present results on a user independent fully automatic system for real time recognition of facial actions from the Facial Action Coding System (FACS). The system automatically d...
Marian Stewart Bartlett, Gwen Littlewort, Mark G. ...
VL
1994
IEEE
164views Visual Languages» more  VL 1994»
15 years 2 months ago
Similarity Patterns in Language
Dotplot is a technique for visualizing patterns of string matches in millions of lines of text and code. Patterns may be explored interactively or detected automatically. Applicat...
Jonathan Helfman
FDTC
2008
Springer
144views Cryptology» more  FDTC 2008»
14 years 11 months ago
Comparative Analysis of Robust Fault Attack Resistant Architectures for Public and Private Cryptosystems
The adaptive and active nature of fault based sidechannel attacks along with the large arsenal of fault injection methods complicates the design of effective countermeasures. To o...
Konrad J. Kulikowski, Zhen Wang, Mark G. Karpovsky