Sciweavers

2421 search results - page 118 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CADE
2009
Springer
16 years 1 months ago
Integrated Reasoning and Proof Choice Point Selection in the Jahob System - Mechanisms for Program Survival
In recent years researchers have developed a wide range of powerful automated reasoning systems. We have leveraged these systems to build Jahob, a program specification, analysis, ...
Martin C. Rinard
107
Voted
DATE
2003
IEEE
134views Hardware» more  DATE 2003»
15 years 6 months ago
A Multi-Level Design Flow for Incorporating IP Cores: Case Study of 1D Wavelet IP Integration
The design of high performance multimedia systems in a short time force us to use IP's blocks in many designs. However, their correct integration in a design implies more com...
Adel Baganne, Imed Bennour, Mehrez Elmarzougui, Ri...
101
Voted
IVC
2000
119views more  IVC 2000»
15 years 17 days ago
Real time tracking of borescope tip pose
In this paper we present a technique for tracking borescope tip pose in real-time. While borescopes are used regularly to inspect machinery for wear or damage, knowing the exact l...
Ken Martin, Charles V. Stewart
107
Voted
EDM
2009
110views Data Mining» more  EDM 2009»
14 years 10 months ago
Using Learning Decomposition and Bootstrapping with Randomization to Compare the Impact of Different Educational Interventions o
A basic question of instructional interventions is how effective it is in promoting student learning. This paper presents a study to determine the relative efficacy of different in...
Mingyu Feng, Joseph Beck, Neil T. Heffernan
ACSAC
2002
IEEE
15 years 5 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...