Sciweavers

1629 search results - page 200 / 326
» Infeasible Code Detection
Sort
View
WDAG
1998
Springer
107views Algorithms» more  WDAG 1998»
15 years 5 months ago
Transient Fault Detectors
We present fault detectors for transient faults, (i.e. corruptions of the memory of the processors, but not of the code of the processors). We distinguish fault detectors for tasks...
Joffroy Beauquier, Sylvie Delaët, Shlomi Dole...
ESANN
2007
15 years 3 months ago
Bat echolocation modelling using spike kernels with Support Vector Regression
Abstract. From the echoes of their vocalisations bats extract information about the positions of reflectors. To gain an understanding of how target position is translated into neu...
Bertrand Fontaine, Herbert Peremans, Benjamin Schr...

Publication
241views
15 years 3 months ago
Fast compositing for cluster-parallel rendering
The image compositing stages in cluster-parallel rendering for gathering and combining partial rendering results into a final display frame are fundamentally limited by node-to-nod...
Maxim Makhinya, Stefan Eilemann, Renato Pajarola
JOT
2010
113views more  JOT 2010»
15 years 5 hour ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada
RAID
2010
Springer
14 years 12 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo