Sciweavers

977 search results - page 26 / 196
» Soft Constraints for Security
Sort
View
BALT
2006
15 years 1 months ago
Introducing Softness into Inductive Queries on String Databases
In many application domains (e.g., WWW mining, molecular biology), large string datasets are available and yet under-exploited. The inductive database framework assumes that both s...
Ieva Mitasiunaite, Jean-François Boulicaut
TIP
2010
94views more  TIP 2010»
14 years 4 months ago
User-Friendly Interactive Image Segmentation Through Unified Combinatorial User Inputs
One weakness in the existing interactive image segmentation algorithms is the lack of more intelligent ways to understand the intention of user inputs. In this paper, we advocate t...
Wenxian Yang, Jianfei Cai, Jianmin Zheng, Jiebo Lu...
ISSE
2010
14 years 4 months ago
Randomized constraint solvers: a comparative study
Mitsuo Takaki, Diego Cavalcanti, Rohit Gheyi, Juli...
PLDI
2009
ACM
15 years 10 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
IROS
2008
IEEE
120views Robotics» more  IROS 2008»
15 years 4 months ago
Soft motion trajectory planner for service manipulator robot
Abstract— Human interaction introduces two main constraints: Safety and Comfort. Therefore service robot manipulator can’t be controlled like industrial robotic manipulator whe...
Xavier Broquère, Daniel Sidobre, Ignacio He...