Sciweavers

1629 search results - page 248 / 326
» Infeasible Code Detection
Sort
View
GFKL
2007
Springer
148views Data Mining» more  GFKL 2007»
15 years 5 months ago
Information Integration of Partially Labeled Data
Abstract. A central task when integrating data from different sources is to detect identical items. For example, price comparison websites have to identify offers for identical p...
Steffen Rendle, Lars Schmidt-Thieme
DASC
2006
IEEE
15 years 5 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...
IOLTS
2006
IEEE
103views Hardware» more  IOLTS 2006»
15 years 5 months ago
Designing Robust Checkers in the Presence of Massive Timing Errors
So far, performance and reliability of circuits have been determined by worst-case characterization of silicon and environmental noise. As new deep sub-micron technologies exacerb...
Frederic Worm, Patrick Thiran, Paolo Ienne
SCAM
2006
IEEE
15 years 5 months ago
SMART C: A Semantic Macro Replacement Translator for C
Programmers often want to transform the source or binary representations of their programs (e.g., to optimize, add dynamic safety checks, or add profile gathering code). Unfortun...
Matthew Jacobs, E. Christopher Lewis