Sciweavers

1629 search results - page 215 / 326
» Infeasible Code Detection
Sort
View
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...
INFOSCALE
2006
ACM
15 years 7 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
ICMCS
2005
IEEE
152views Multimedia» more  ICMCS 2005»
15 years 7 months ago
Pre-Attentional Filtering in Compressed Video
We propose the use of attentional cascades based on the DCT and motion information contained in an MPEG coded stream. An attentional cascade is a sequence of very efficient class...
Juan María Sánchez, Ramon Lluis Feli...
WCRE
2005
IEEE
15 years 7 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
HIPEAC
2005
Springer
15 years 7 months ago
A Practical Method for Quickly Evaluating Program Optimizations
This article aims at making iterative optimization practical and usable by speeding up the evaluation of a large range of optimizations. Instead of using a full run to evaluate a s...
Grigori Fursin, Albert Cohen, Michael F. P. O'Boyl...