Sciweavers

1686 search results - page 286 / 338
» Programs as polygraphs: computability and complexity
Sort
View
CEC
2008
IEEE
15 years 4 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ICASSP
2008
IEEE
15 years 4 months ago
Deformable trellis: open contour tracking in bio-image sequences
This paper presents an open contour tracking method that employs an arc-emission Hidden Markov Model (HMM). The algorithm encodes the shape information of the structure in a spati...
Mehmet Emre Sargin, Alphan Altinok, Kenneth Rose, ...
IEEEPACT
2008
IEEE
15 years 4 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
RTCSA
2008
IEEE
15 years 4 months ago
Maximizing the Fault Tolerance Capability of Fixed Priority Schedules
Real-time systems typically have to satisfy complex requirements, mapped to the task attributes, eventually guaranteed by the underlying scheduler. These systems consist of a mix ...
Radu Dobrin, Hüseyin Aysan, Sasikumar Punnekk...
SASO
2008
IEEE
15 years 4 months ago
An Emergent System for Self-Aligning and Self-Organizing Shape Primitives
Motivated by the natural phenomenon of living cells selforganizing into specific shapes and structures, we present an emergent system that utilizes evolutionary computing methods...
Linge Bai, Manolya Eyiyurekli, David E. Breen