Sciweavers

3639 search results - page 105 / 728
» Provenance as Dependency Analysis
Sort
View
DATE
2006
IEEE
82views Hardware» more  DATE 2006»
15 years 4 months ago
Performance analysis of greedy shapers in real-time systems
— Traffic shaping is a well-known technique in the area of networking and is proven to reduce global buffer requirements and end-to-end delays in networked systems. Due to these...
Ernesto Wandeler, Alexander Maxiaguine, Lothar Thi...
DAC
2004
ACM
15 years 11 months ago
Abstraction refinement by controllability and cooperativeness analysis
ion Refinement by Controllability and Cooperativeness Analysis Freddy Y.C. Mang and Pei-Hsin Ho Advanced Technology Group, Synopsys, Inc. {fmang, pho}@synopsys.com nt a new abstrac...
Freddy Y. C. Mang, Pei-Hsin Ho
SAC
2010
ACM
15 years 4 months ago
Dual analysis for proving safety and finding bugs
Program bugs remain a major challenge for software developers and various tools have been proposed to help with their localization and elimination. Most present-day tools are base...
Corneliu Popeea, Wei-Ngan Chin
CVPR
2007
IEEE
15 years 12 months ago
Filtered Component Analysis to Increase Robustness to Local Minima in Appearance Models
Appearance Models (AM) are commonly used to model appearance and shape variation of objects in images. In particular, they have proven useful to detection, tracking, and synthesis...
Fernando De la Torre, Alvaro Collet, Manuel Quero,...
WETICE
2008
IEEE
15 years 4 months ago
Decentralized Network Analysis: A Proposal
In recent years, the peer-to-peer paradigm has gained momentum in several application areas: file-sharing and VoIP applications have been able to attract millions of end users, w...
Alberto Montresor