Sciweavers

1024 search results - page 137 / 205
» Value complete, column complete, predicate complete
Sort
View
ACSAC
2006
IEEE
15 years 6 months ago
A General Dynamic Information Flow Tracking Framework for Security Applications
Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic in...
Lap-Chung Lam, Tzi-cker Chiueh
DATE
2006
IEEE
104views Hardware» more  DATE 2006»
15 years 6 months ago
Equivalence verification of arithmetic datapaths with multiple word-length operands
Abstract: This paper addresses the problem of equivalence verification of RTL descriptions that implement arithmetic computations (add, mult, shift) over bitvectors that have diļ¬...
Namrata Shekhar, Priyank Kalla, Florian Enescu
HICSS
2006
IEEE
77views Biometrics» more  HICSS 2006»
15 years 6 months ago
Using Social Contextual Information to Match Criminal Identities
Criminal identity matching is crucial to crime investigation in law enforcement agencies. Existing techniques match identities that refer to the same individuals based on simple i...
G. Alan Wang, Jennifer Jie Xu, Hsinchun Chen
ICALT
2006
IEEE
15 years 6 months ago
Hybrid System for Generating Learning Object Metadata
– Generating LOM for learning material is a complex and tedious task to be manually completed. Therefore, the current trend is to automate this process. However, there are severa...
Olivier Motelet, Nelson A. Baloian
ICPP
2006
IEEE
15 years 6 months ago
A PROactive Request Distribution (PRORD) Using Web Log Mining in a Cluster-Based Web Server
Widely adopted distributor-based systems forward user requests to a balanced set of waiting servers in complete transparency to the users. The policy employed in forwarding reques...
Heung Ki Lee, Gopinath Vageesan, Ki Hwan Yum, Eun ...