Sciweavers

266 search results - page 47 / 54
» Linear Recursion
Sort
View
SEKE
2010
Springer
15 years 8 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
DAC
2010
ACM
14 years 12 months ago
MFTI: matrix-format tangential interpolation for modeling multi-port systems
Numerous algorithms to macromodel a linear time-invariant (LTI) system from its frequency-domain sampling data have been proposed in recent years [1, 2, 3, 4, 5, 6, 7, 8], among w...
Yuanzhe Wang, Chi-Un Lei, Grantham K. H. Pang, Nga...
ESTIMEDIA
2009
Springer
14 years 11 months ago
Optimal stack frame placement and transfer for energy reduction targeting embedded processors with scratch-pad memories
Abstract--Memory accesses are a major cause of energy consumption for embedded systems and the stack is a frequent target for data accesses. This paper presents a fully software te...
Lovic Gauthier, Tohru Ishihara
129
Voted
ICCV
2009
IEEE
14 years 11 months ago
Robust dynamical model for simultaneous registration and segmentation in a variational framework: A Bayesian approach
We introduce a dynamical model for simultaneous registration and segmentation in a variational framework for image sequences, where the dynamics is incorporated using a Bayesian f...
Pratim Ghosh, Mehmet Emre Sargin, Bangalore S. Man...
CVPR
2011
IEEE
1473views Computer Vision» more  CVPR 2011»
14 years 10 months ago
Object Recognition with Hierarchical Kernel Descriptors
Kernel descriptors provide a unified way to generate rich visual feature sets by turning pixel attributes into patch-level features, and yield impressive results on many object rec...
Liefeng Bo, Kevin Lai, Xiaofeng Ren and Dieter Fox