Sciweavers

92 search results - page 7 / 19
» An Algorithm for Automated Generation of Invariants for Loop...
Sort
View
NDSS
2008
IEEE
14 years 2 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
ECUMN
2007
Springer
14 years 1 months ago
Path Computation for Incoming Interface Multipath Routing
— Currently used IP routing protocols calculate and only use a single path between two nodes of a network, or in the best case, only paths with the same cost (with OSPF2 or IS-IS...
Pascal Mérindol, Jean-Jacques Pansiot, St&e...
DAC
2008
ACM
14 years 8 months ago
DVFS in loop accelerators using BLADES
Hardware accelerators are common in embedded systems that have high performance requirements but must still operate within stringent energy constraints. To facilitate short time-t...
Ganesh S. Dasika, Shidhartha Das, Kevin Fan, Scott...
AVBPA
2005
Springer
350views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Pose Invariant Face Recognition Under Arbitrary Illumination Based on 3D Face Reconstruction
Pose and illumination changes from picture to picture are two main barriers toward full automatic face recognition. In this paper, a novel method to handle both pose and lighting c...
Xiujuan Chai, Laiyun Qing, Shiguang Shan, Xilin Ch...
DAC
2001
ACM
14 years 8 months ago
Dynamic Detection and Removal of Inactive Clauses in SAT with Application in Image Computation
In this paper, we present a new technique for the e cient dynamic detection and removal of inactive clauses, i.e. clauses that do not a ect the solutions of interest of a Boolean ...
Aarti Gupta, Anubhav Gupta, Zijiang Yang, Pranav A...