Sciweavers

2388 search results - page 402 / 478
» Kernel information embeddings
Sort
View
SBACPAD
2007
IEEE
143views Hardware» more  SBACPAD 2007»
15 years 10 months ago
A Code Compression Method to Cope with Security Hardware Overheads
Code Compression has been used to alleviate the memory requirements as well as to improve performance and/or minimize energy consumption. On the other hand, implementing security ...
Eduardo Wanderley Netto, Romain Vaslin, Guy Gognia...
SCAM
2007
IEEE
15 years 10 months ago
Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes
To encourage open source/libre software development, it is desirable to have tools that can help to identify open source license violations. This paper describes the implementatio...
Arnoldo José Müller Molina, Takeshi Sh...
ACCV
2007
Springer
15 years 10 months ago
Converting Thermal Infrared Face Images into Normal Gray-Level Images
In this paper, we address the problem of producing visible spectrum facial images as we normally see by using thermal infrared images. We apply Canonical Correlation Analysis (CCA)...
Mingsong Dou, Chao Zhang, Pengwei Hao, Jun Li
CAV
2007
Springer
173views Hardware» more  CAV 2007»
15 years 10 months ago
Array Abstractions from Proofs
stractions from Proofs Ranjit Jhala1 Kenneth L. McMillan2 1 UC San Diego 2 Cadence Berkeley Laboratories We present a technique for using infeasible program paths to automatically ...
Ranjit Jhala, Kenneth L. McMillan
ICSE
2007
IEEE-ACM
15 years 10 months ago
Architecture Knowledge Management: Challenges, Approaches, and Tools
Capturing the technical knowledge, contextual information, and rationale surrounding the design decisions underpinning system architectures can greatly improve the software develo...
Muhammad Ali Babar, Ian Gorton