Sciweavers

146 search results - page 29 / 30
» Rewriting of Regular Expressions and Regular Path Queries
Sort
View
102
Voted
CIKM
1998
Springer
15 years 1 months ago
Supporting Fast Search in Time Series for Movement Patterns in Multiple Scales
An important investigation of time series involves searching for \movement" patterns, such as \going up" or \going down" or some combinations of them. Movement patt...
Yunyao Qu, Changzhou Wang, Xiaoyang Sean Wang
CASES
2009
ACM
15 years 4 months ago
CheckerCore: enhancing an FPGA soft core to capture worst-case execution times
Embedded processors have become increasingly complex, resulting in variable execution behavior and reduced timing predictability. On such processors, safe timing specifications e...
Jin Ouyang, Raghuveer Raghavendra, Sibin Mohan, Ta...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
CGA
1998
14 years 9 months ago
Composite Lighting Simulations with Lighting Networks
A whole variety of different techniques for simulating global illumination in virtual environments have been developed over recent years. Each technique, including Radiosity, Mont...
Philipp Slusallek, Marc Stamminger, Wolfgang Heidr...
93
Voted
BPSC
2007
171views Business» more  BPSC 2007»
14 years 11 months ago
XML Databases: Principles and Usage
Originally XML was used as a standard protocol for data exchange in computing. The evolution of information technology has opened up new situations in which XML can be used to aut...
Jaroslav Pokorný