Sciweavers

1629 search results - page 189 / 326
» Infeasible Code Detection
Sort
View
ISSTA
2010
ACM
15 years 3 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
SP
2008
IEEE
15 years 1 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
TIP
1998
122views more  TIP 1998»
15 years 1 months ago
An error resilient scheme for image transmission over noisy channels with memory
Abstract— This correspondence addresses the use of a joint sourcechannel coding strategy for enhancing the error resilience of images transmitted over a binary channel with addit...
Philippe Burlina, Fady Alajaji
IEEECIT
2010
IEEE
15 years 3 days ago
Exploiting More Parallelism from Applications Having Generalized Reductions on GPU Architectures
Reduction is a common component of many applications, but can often be the limiting factor for parallelization. Previous reduction work has focused on detecting reduction idioms a...
Xiao-Long Wu, Nady Obeid, Wen-Mei Hwu
144
Voted
CVPR
2012
IEEE
13 years 4 months ago
Recognizing proxemics in personal photos
Proxemics is the study of how people interact. We present a computational formulation of visual proxemics by attempting to label each pair of people in an image with a subset of p...
Yi Yang, Simon Baker, Anitha Kannan, Deva Ramanan