Sciweavers

2631 search results - page 214 / 527
» Less is More
Sort
View
97
Voted
MSR
2009
ACM
15 years 7 months ago
Code siblings: Technical and legal implications of copying code between applications
Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolv...
Daniel M. Germán, Massimiliano Di Penta, Ya...
104
Voted
CVPR
2007
IEEE
15 years 7 months ago
Matrix-Structural Learning (MSL) of Cascaded Classifier from Enormous Training Set
Aiming at the problem when both positive and negative training set are enormous, this paper proposes a novel Matrix-Structural Learning (MSL) method, as an extension to Viola and ...
Shengye Yan, Shiguang Shan, Xilin Chen, Wen Gao, J...
ISCAS
1995
IEEE
91views Hardware» more  ISCAS 1995»
15 years 4 months ago
An FPGA Based Reconfigurable Coprocessor Board Utilizing a Mathematics of Arrays
Abstract -- Work in progress at the University of Missouri-Rolla on hardware assists for high performance computing is presented. This research consists of a novel field programmab...
W. Eatherton, J. Kelly, T. Schiefelbein, H. Pottin...
127
Voted
FORTE
2008
15 years 2 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
90
Voted
CN
2002
74views more  CN 2002»
15 years 19 days ago
Dynamic buffer management scheme based on rate estimation in packet-switched networks
Abstract-- While traffic volume of real-time applications is rapidly increasing, current routers do not guarantee minimum QoS values of fairness and they drop packets in random fas...
Jeong-woo Cho, Dong-Ho Cho