Sciweavers

8795 search results - page 1624 / 1759
» Measuring Generality of Documents
Sort
View
IPCCC
2006
IEEE
15 years 5 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
ISESE
2006
IEEE
15 years 5 months ago
An industrial case study of structural testing applied to safety-critical embedded software
Effective testing of safety-critical real-time embedded software is difficult and expensive. Many companies are hesitant about the cost of formalized criteria-based testing and a...
Jing Guan, Jeff Offutt, Paul Ammann
ACL2
2006
ACM
15 years 5 months ago
A verifying core for a cryptographic language compiler
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code.1 We report the use of ACL2 in building a verifying compiler f...
Lee Pike, Mark Shields, John Matthews
ACMACE
2006
ACM
15 years 5 months ago
Wireless home entertainment center: reducing last hop delays for real-time applications
Future digital entertainment services available to home users will share several characteristics: i) they will be deployed and delivered through the Internet, ii) a single media c...
Claudio E. Palazzi, Giovanni Pau, Marco Roccetti, ...
APGV
2006
ACM
103views Visualization» more  APGV 2006»
15 years 5 months ago
Perception of image motion during head movement
Previous studies have shown that self-motion has an inhibiting effect on concurrent 3D motion perception. To investigate whether self-motion similarly impairs concurrent image mot...
Li Li, Bernard D. Adelstein, Stephen R. Ellis
« Prev « First page 1624 / 1759 Last » Next »