Sciweavers

10054 search results - page 1731 / 2011
» On the Complexity of Function Learning
Sort
View
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 8 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
150
Voted
ESEM
2009
ACM
15 years 8 months ago
Test coverage and post-verification defects: A multiple case study
Test coverage is a promising measure of test effectiveness and development organizations are interested in costeffective levels of coverage that provide sufficient fault removal w...
Audris Mockus, Nachiappan Nagappan, Trung T. Dinh-...
151
Voted
GI
2009
Springer
15 years 8 months ago
Parallelised Gaussian Mixture Filtering for Vehicular Traffic Flow Estimation
: Large traffic network systems require handling huge amounts of data, often distributed over a large geographical region in space and time. Centralised processing is not then the ...
Lyudmila Mihaylova, Amadou Gning, Viktor Doychinov...
158
Voted
ICASSP
2007
IEEE
15 years 8 months ago
Relevance Network Modeling for Muscle Association Pattern in Reaching Movements
Our purpose is to study how different muscles collaborate together to efficiently create a smooth, coordinated reaching movement. In the EMG literature, it has been commonplace to...
Z. Jane Wang, Martin J. McKeown
170
Voted
ICCAD
2007
IEEE
151views Hardware» more  ICCAD 2007»
15 years 8 months ago
A design flow dedicated to multi-mode architectures for DSP applications
This paper addresses the design of multi-mode architectures for digital signal processing applications. We present a dedicated design flow and its associated high-level synthesis t...
Cyrille Chavet, Caaliph Andriamisaina, Philippe Co...
« Prev « First page 1731 / 2011 Last » Next »