Sciweavers

790 search results - page 155 / 158
» A new approach to detecting the corners in digital images
Sort
View
CSMR
2004
IEEE
13 years 12 months ago
Supporting Architectural Restructuring by Analyzing Feature Models
In order to lower the risk, reengineering projects aim at high reuse rates. Therefore, tasks like architectural restructuring have to be performed in a way that developed new syst...
Ilian Pashov, Matthias Riebisch, Ilka Philippow
ISBI
2006
IEEE
14 years 9 months ago
Mapping ventricular changes related to dementia and mild cognitive impairment in a large community-based cohort
We present a fully-automated technique for visualizing localized cerebral ventricle shape differences between large clinical subject groups who have received a magnetic resonance ...
Owen T. Carmichael, Paul M. Thompson, Rebecca A. D...
NDSS
2008
IEEE
14 years 2 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
SAC
2009
ACM
14 years 3 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
ISCA
2010
IEEE
199views Hardware» more  ISCA 2010»
14 years 5 days ago
Use ECP, not ECC, for hard failures in resistive memories
As leakage and other charge storage limitations begin to impair the scalability of DRAM, non-volatile resistive memories are being developed as a potential replacement. Unfortunat...
Stuart E. Schechter, Gabriel H. Loh, Karin Straus,...