Sciweavers

1054 search results - page 182 / 211
» Models for automatic generation of safety-critical real-time...
Sort
View
SEKE
2010
Springer
15 years 6 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
ICRA
2000
IEEE
165views Robotics» more  ICRA 2000»
15 years 6 months ago
An Approach to Rapid Manufacturing with Custom Fixturing
We present an approach for automatically generating complete process plans, including xturing and CNC code, from high level shape feature part descriptions. The demonstration syst...
Mark Bloomenthal, Richard F. Riesenfeld, Elaine Co...
137
Voted
PATMOS
2000
Springer
15 years 5 months ago
Early Power Estimation for System-on-Chip Designs
Abstract. Reduction of chip packaging and cooling costs for deep sub-micron SystemOn-Chip (SOC) designs is an emerging issue. We present a simulation-based methodology able to real...
Marcello Lajolo, Luciano Lavagno, Matteo Sonza Reo...
SI3D
1995
ACM
15 years 5 months ago
Visual Navigation of Large Environments Using Textured Clusters
A visual navigation system is described which uses texture mapped primitives to represent clusters of objects to maintain high and approximately constant frame rates. In cases whe...
Paulo W. C. Maciel, Peter Shirley
142
Voted
PAMI
2011
14 years 8 months ago
Bilayer Segmentation of Webcam Videos Using Tree-Based Classifiers
—This paper presents an automatic segmentation algorithm for video frames captured by a (monocular) webcam that closely approximates depth segmentation from a stereo camera. The ...
Pei Yin, Antonio Criminisi, John M. Winn, Irfan A....