Sciweavers

416 search results - page 72 / 84
» Intellectual Property and Open Systems
Sort
View
SAS
2004
Springer
15 years 3 months ago
Generalized Records and Spatial Conjunction in Role Logic
Role logic is a notation for describing properties of relational structures in shape analysis, databases and knowledge bases. A natural fragment of role logic corresponds to two-va...
Viktor Kuncak, Martin C. Rinard
PLDI
2000
ACM
15 years 2 months ago
Safety checking of machine code
We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system. Our safety-checking technique operates directly on the u...
Zhichen Xu, Barton P. Miller, Thomas W. Reps
ICLP
2007
Springer
15 years 1 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
APNOMS
2008
Springer
14 years 11 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
BILDMED
2007
109views Algorithms» more  BILDMED 2007»
14 years 11 months ago
A Fast and Flexible Image Registration Toolbox
Abstract. In the last decades there has been tremendous research towards the design of fully automatic non-rigid registration schemes. However, apart from the ITK based implementat...
Nils Papenberg, Hanno Schumacher, Stefan Heldmann,...