Sciweavers

4955 search results - page 797 / 991
» Multiple Pattern Databases
Sort
View
TSE
2008
91views more  TSE 2008»
15 years 2 months ago
Privately Finding Specifications
Buggy software is a reality and automated techniques for discovering bugs are highly desirable. A specification describes the correct behavior of a program. For example, a file mus...
Westley Weimer, Nina Mishra
JUCS
2007
104views more  JUCS 2007»
15 years 2 months ago
Real-time Architecture for Robust Motion Estimation under Varying Illumination Conditions
: Motion estimation from image sequences is a complex problem which requires high computing resources and is highly affected by changes in the illumination conditions in most of th...
Javier Díaz, Eduardo Ros, Rafael Rodr&iacut...
VLSISP
2008
106views more  VLSISP 2008»
15 years 2 months ago
Architecture Considerations for Multi-Format Programmable Video Processors
Many different video processor architectures exist. Its architecture gives a processor strength for a particular application. Hardwired logic yields the best performance/cost, but ...
Jonah Probell
ET
2000
80views more  ET 2000»
15 years 1 months ago
A New Method for Testing Re-Programmable PLAs
: We present a method for obtaining a minimal set of test configurations and their associated set oftest patterns that completely tests re-programmable Programmable Logic Arrays (P...
Charles E. Stroud, James R. Bailey, Johan R. Emmer...
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 1 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz