Sciweavers

5580 search results - page 763 / 1116
» Randomized priority algorithms
Sort
View
174
Voted
ACSAC
2007
IEEE
15 years 10 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
135
Voted
GLVLSI
2007
IEEE
139views VLSI» more  GLVLSI 2007»
15 years 10 months ago
Synthesis of irregular combinational functions with large don't care sets
A special logic synthesis problem is considered for Boolean functions which have large don’t care sets and are irregular. Here, a function is considered as irregular if the inpu...
Valentin Gherman, Hans-Joachim Wunderlich, R. D. M...
ICDIM
2007
IEEE
15 years 10 months ago
An access control video watermarking method that is robust to geometric distortions
: A new video watermarking algorithm for access control is introduced. This method is content-dependent and uses the dual tree complex wavelet transform (DT CWT) to create a waterm...
Lino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreid...
ICRA
2007
IEEE
156views Robotics» more  ICRA 2007»
15 years 10 months ago
Multipartite RRTs for Rapid Replanning in Dynamic Environments
Abstract— The Rapidly-exploring Random Tree (RRT) algorithm has found widespread use in the field of robot motion planning because it provides a single-shot, probabilistically c...
Matthew Zucker, James J. Kuffner, Michael S. Brani...
108
Voted
MSS
2007
IEEE
85views Hardware» more  MSS 2007»
15 years 10 months ago
Providing Quality of Service Support in Object-Based File System
Bourbon is a quality of service framework designed to work with the Ceph object-based storage system. Ceph is a highly scalable distributed file system that can scale up to tens ...
Joel C. Wu, Scott A. Brandt