Sciweavers

4911 search results - page 720 / 983
» Tree dependence analysis
Sort
View
133
Voted
CAISE
2009
Springer
15 years 7 months ago
Data-Flow Anti-patterns: Discovering Data-Flow Errors in Workflows
Despite the abundance of analysis techniques to discover control-flow errors in workflow designs, there is hardly any support for w verification. Most techniques simply abstract fr...
Nikola Trcka, Wil M. P. van der Aalst, Natalia Sid...
161
Voted
BROADNETS
2007
IEEE
15 years 7 months ago
Energy-efficient transmission for multimedia streams in last-hop wireless internet
Multimedia applications have unique characteristics that can be leveraged to design energy-efficient loss recovery mechanisms. Given their loss tolerance and strict timing requirem...
Albert F. Harris III, Robin Snader, Robin Kravets
113
Voted
ISSTA
2010
ACM
15 years 7 months ago
N-version disassembly: differential testing of x86 disassemblers
The output of a disassembler is used for many different purposes (e.g., debugging and reverse engineering). Therefore, disassemblers represent the first link of a long chain of s...
Roberto Paleari, Lorenzo Martignoni, Giampaolo Fre...
141
Voted
CVPR
2009
IEEE
15 years 7 months ago
Depth from sliding projections
In this paper we present a novel method for 3D structure acquisition, based on structured light. Unlike classical structured light methods, in which a static projector illuminates...
Chris Hermans, Yannick Francken, Tom Cuypers, Phil...
129
Voted
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir