Sciweavers

2513 search results - page 305 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
94
Voted
AAI
2000
122views more  AAI 2000»
15 years 18 days ago
High-Level Interpretation in Virtual Environments
: As Virtual Environments applications become more complex, there is a need to interpret user interaction in terms of high-level concepts. In this paper, we investigate the relatio...
Marc Cavazza, Ian Palmer
RAID
2010
Springer
14 years 11 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
142
Voted
IEEESCC
2010
IEEE
14 years 10 months ago
BPEL Remote Objects: Integrating BPEL Processes into Object-Oriented Applications
Service-orientation and object-oriented design are common practice in the field of business application development. Business process execution languages help to facilitate the orc...
Marvin Ferber, Thomas Rauber, Sascha Hunold
LPAR
2010
Springer
14 years 10 months ago
Interpolating Quantifier-Free Presburger Arithmetic
Craig interpolation has become a key ingredient in many symbolic model checkers, serving as an approximative replacement for expensive quantifier elimination. In this paper, we foc...
Daniel Kroening, Jérôme Leroux, Phili...
105
Voted
ICASSP
2009
IEEE
14 years 10 months ago
VLSI for 5000-word continuous speech recognition
We have developed a VLSI chip for 5,000 word speakerindependent continuous speech recognition. This chip employs a context-dependent HMM (hidden Markov model) based speech recogni...
Young-kyu Choi, Kisun You, Jungwook Choi, Wonyong ...