Sciweavers

266 search results - page 47 / 54
» Linear Recursion
Sort
View
SEKE
2010
Springer
14 years 10 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
DAC
2010
ACM
14 years 9 months ago
MFTI: matrix-format tangential interpolation for modeling multi-port systems
Numerous algorithms to macromodel a linear time-invariant (LTI) system from its frequency-domain sampling data have been proposed in recent years [1, 2, 3, 4, 5, 6, 7, 8], among w...
Yuanzhe Wang, Chi-Un Lei, Grantham K. H. Pang, Nga...
ESTIMEDIA
2009
Springer
14 years 9 months ago
Optimal stack frame placement and transfer for energy reduction targeting embedded processors with scratch-pad memories
Abstract--Memory accesses are a major cause of energy consumption for embedded systems and the stack is a frequent target for data accesses. This paper presents a fully software te...
Lovic Gauthier, Tohru Ishihara
ICCV
2009
IEEE
14 years 9 months ago
Robust dynamical model for simultaneous registration and segmentation in a variational framework: A Bayesian approach
We introduce a dynamical model for simultaneous registration and segmentation in a variational framework for image sequences, where the dynamics is incorporated using a Bayesian f...
Pratim Ghosh, Mehmet Emre Sargin, Bangalore S. Man...
CVPR
2011
IEEE
1473views Computer Vision» more  CVPR 2011»
14 years 8 months ago
Object Recognition with Hierarchical Kernel Descriptors
Kernel descriptors provide a unified way to generate rich visual feature sets by turning pixel attributes into patch-level features, and yield impressive results on many object rec...
Liefeng Bo, Kevin Lai, Xiaofeng Ren and Dieter Fox