Sciweavers

988 search results - page 42 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
DSN
2008
IEEE
15 years 6 months ago
Using likely program invariants to detect hardware errors
In the near future, hardware is expected to become increasingly vulnerable to faults due to continuously decreasing feature size. Software-level symptoms have previously been used...
Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandr...
AAAI
2000
15 years 1 months ago
The Game of Hex: An Automatic Theorem Proving Approach to Game Programming
The game of Hex is a two-player game with simple rules, a deep underlying mathematical beauty, and a strategic complexity comparable to that of Chess and Go. The massive game-tree...
Vadim V. Anshelevich
IEEEPACT
1998
IEEE
15 years 4 months ago
Parallelization of Benchmarks for Scalable Shared-Memory Multiprocessors
This work identifies practical compiling techniques for scalable shared memory machines. For this, we have focused on experimental studies using a real machine and representative ...
Yunheung Paek, Angeles G. Navarro, Emilio L. Zapat...
ECCV
1996
Springer
16 years 1 months ago
Object Recognition Using Multidimensional Receptive Field Histograms
This paper presents a technique to determine the identity of objects in a scene using histograms of the responses of a vector of local linear neighborhood operators (receptive elds...
Bernt Schiele, James L. Crowley
CCCG
2006
15 years 1 months ago
On Planar Path Transformation
A flip or edge-replacement is considered as a transformation by which one edge e of a geometric object is removed and an edge f (f = e) is inserted such that the resulting object ...
Kamrul Islam, Selim G. Akl, Henk Meijer