Sciweavers

1222 search results - page 213 / 245
» Verifying a File System Implementation
Sort
View
102
Voted
CVPR
2008
IEEE
15 years 6 months ago
3D face tracking and expression inference from a 2D sequence using manifold learning
We propose a person-dependent, manifold-based approach for modeling and tracking rigid and nonrigid 3D facial deformations from a monocular video sequence. The rigid and nonrigid ...
Wei-Kai Liao, Gérard G. Medioni
IWNAS
2008
IEEE
15 years 6 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
KBSE
2008
IEEE
15 years 6 months ago
Using Simulation to Investigate Requirements Prioritization Strategies
—Agile and traditional plan-based approaches to software system development both agree that prioritizing requirements is an essential activity. They differ in basic strategy - wh...
Daniel Port, Alexy Olkov, Tim Menzies
SCAM
2008
IEEE
15 years 6 months ago
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in impr...
Lei Wang, Qiang Zhang, PengChao Zhao
93
Voted
ICC
2007
IEEE
137views Communications» more  ICC 2007»
15 years 6 months ago
BER Analysis of 802.11b Networks Under Mobility
—Most of the current 802.11b research activities are conducted under stationary environment. As the need for highspeed connectivity in mobile environments increases, it becomes n...
Puttipong Mahasukhon, Michael Hempel, Hamid Sharif...