Sciweavers

176 search results - page 27 / 36
» Automatic Amortised Worst-Case Execution Time Analysis
Sort
View
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
13 years 9 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
ASPLOS
2006
ACM
14 years 1 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
HICSS
2007
IEEE
187views Biometrics» more  HICSS 2007»
14 years 1 months ago
A Service-Oriented Data Integration and Analysis Environment for In Silico Experiments and Bioinformatics Research
In this paper, we present a practical experiment of building a service-oriented system upon current web services technologies and bioinformatics middleware. The system allows scie...
Xiaorong Xiang, Gregory R. Madey, Jeanne Romero-Se...
ICECCS
2005
IEEE
171views Hardware» more  ICECCS 2005»
14 years 1 months ago
Behavior Capture and Test: Automated Analysis of Component Integration
Component-based technology is increasingly adopted to speed up the development of complex software through component reuse. Unfortunately, the lack of complete information about r...
Leonardo Mariani, Mauro Pezzè
ICPP
1999
IEEE
13 years 11 months ago
Access Descriptor Based Locality Analysis for Distributed-Shared Memory Multiprocessors
Most of today's multiprocessors have a DistributedShared Memory (DSM) organization, which enables scalability while retaining the convenience of the shared-memory programming...
Angeles G. Navarro, Rafael Asenjo, Emilio L. Zapat...