Sciweavers

1425 search results - page 162 / 285
» Beyond Dependency Graphs
Sort
View
IWIA
2005
IEEE
14 years 1 months ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan
CC
2003
Springer
14 years 1 months ago
Early Control of Register Pressure for Software Pipelined Loops
Abstract. The register allocation in loops is generally performed after or during the software pipelining process. This is because doing a conventional register allocation at firs...
Sid Ahmed Ali Touati, Christine Eisenbeis
PG
2000
IEEE
14 years 19 days ago
Morphing Using Curves and Shape Interpolation Techniques
This paper presents solutions to the feature correspondence and feature interpolation problems in image morphing. The user specifies the correspondence between the source and the...
Henry Johan, Yuichi Koiso, Tomoyuki Nishita
COCO
2010
Springer
133views Algorithms» more  COCO 2010»
14 years 4 days ago
Spectral Algorithms for Unique Games
We present a new algorithm for Unique Games which is based on purely spectral techniques, in contrast to previous work in the area, which relies heavily on semidefinite programmi...
Alexandra Kolla
DOA
2000
87views more  DOA 2000»
13 years 9 months ago
MODE: A Java-like Environment for Experimenting Mobility Policies
The wide acceptance of object-oriented environments and proposals has renewed interest in all the class inheritance related issues; in particular its implementation in distributed...
Giuliano Armano, Antonio Corradi, Letizia Leonardi...