Sciweavers

1420 search results - page 239 / 284
» Representation of Graphs by OBDDs
Sort
View
ICSM
2008
IEEE
15 years 8 months ago
Change impact analysis for AspectJ programs
Change impact analysis is a useful technique for software evolution. It determines the effects of a source editing session and provides valuable feedbacks to the programmers for m...
Sai Zhang, Zhongxian Gu, Yu Lin, Jianjun Zhao
123
Voted
NDSS
2008
IEEE
15 years 8 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
132
Voted
SASP
2008
IEEE
77views Hardware» more  SASP 2008»
15 years 8 months ago
Resource Sharing in Custom Instruction Set Extensions
Abstract—Customised processor performance generally increases as additional custom instructions are added. However, performance is not the only metric that modern systems must ta...
Marcela Zuluaga, Nigel P. Topham
120
Voted
SMI
2008
IEEE
107views Image Analysis» more  SMI 2008»
15 years 8 months ago
Approximate topological matching of quadrilateral meshes
Abstract In this paper, we study the problem of approximate topological matching for quadrilateral meshes, that is, the problem of finding as large a set as possible of matching p...
David Eppstein, Michael T. Goodrich, Ethan Kim, Ra...
3DIM
2007
IEEE
15 years 8 months ago
Surface Reconstruction from Point Clouds by Transforming the Medial Scaffold
We propose an algorithm for surface reconstruction from unorganized points based on a view of the sampling process as a deformation from the original surface. In the course of thi...
Ming-Ching Chang, Frederic F. Leymarie, Benjamin B...