Sciweavers

3053 search results - page 426 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
102
Voted
TACAS
2010
Springer
178views Algorithms» more  TACAS 2010»
15 years 10 months ago
An Alternative to SAT-Based Approaches for Bit-Vectors
The theory BV of bit-vectors, i.e. fixed-size arrays of bits equipped with standard low-level machine instructions, is becoming very popular in formal verification. Standard solv...
Sébastien Bardin, Philippe Herrmann, Floria...
98
Voted
ACMSE
2008
ACM
15 years 5 months ago
Profiler instrumentation using metaprogramming techniques
Software developers are frequently required to address evolving stakeholder concerns, which often result in changes to the source code of an application. Manually performing invas...
Ritu Arora, Yu Sun, Zekai Demirezen, Jeff Gray
114
Voted
AAAI
2000
15 years 5 months ago
Visual Event Classification via Force Dynamics
This paper presents an implemented system, called LEONARD, that classifies simple spatial motion events, such as pick up and put down, from video input. Unlike previous systems th...
Jeffrey Mark Siskind
129
Voted
ECBS
2006
IEEE
158views Hardware» more  ECBS 2006»
15 years 9 months ago
Automated Translation of C/C++ Models into a Synchronous Formalism
For complex systems that are reusing intellectual property components, functional and compositional design correctness are an important part of the design process. Common system l...
Hamoudi Kalla, Jean-Pierre Talpin, David Berner, L...
126
Voted
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 4 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...