Sciweavers

2468 search results - page 337 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
ACMACE
2009
ACM
15 years 1 months ago
Facial caricature generation using a quadratic deformation model
In this paper we propose a novel approach for generating expressive caricatures from an input image. The novelty of this work comes from combining an Active Appearance Model facia...
Mohammad Obaid, D. Lond, Ramakrishnan Mukundan, Ma...
CCS
2005
ACM
15 years 9 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
DATE
2009
IEEE
98views Hardware» more  DATE 2009»
15 years 10 months ago
A real-time application design methodology for MPSoCs
This paper presents a novel technique for the modeling, simulation, and analysis of real-time applications on MultiProcessor Systems-on-Chip (MPSoCs). This technique is based on a...
Giovanni Beltrame, Luca Fossati, Donatella Sciuto
ICPPW
2000
IEEE
15 years 8 months ago
Active Streaming in Transport Delay Minimization
In this paper we present a technique for reducing response delay for web systems, which is based on a proactive cache scheme. It combines predictive pre-fetching and streaming to ...
Javed I. Khan
139
Voted
ATAL
2008
Springer
15 years 5 months ago
AERIAL: hypothetical trajectory planning for multi-UAVs coordination and control
This paper presents a distributed application named AERIAL which allows coordination and control of multiple Unmanned Aerial Vehicles (UAVs) engaged in temporally constrained miss...
Paul-Edouard Marson, Michaël Soulignac, Patri...