Sciweavers

2018 search results - page 305 / 404
» Code Normal Forms
Sort
View
SAIG
2000
Springer
14 years 13 days ago
Generating Data Analysis Programs from Statistical Models
Extracting information from data, often also called data analysis, is an important scienti c task. Statistical approaches, which use methods from probability theory and numerical a...
Bernd Fischer 0002, Johann Schumann, Thomas Pressb...
USS
2008
13 years 11 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
OSDI
2000
ACM
13 years 10 months ago
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java
Single-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the featur...
Godmar Back, Wilson C. Hsieh, Jay Lepreau
TIP
2008
118views more  TIP 2008»
13 years 8 months ago
Minimum Variance Optimal Rate Allocation for Multiplexed H.264/AVC Bitstreams
Consider the problem of transmitting multiple video streams to fulfill a constant bandwidth constraint. The available bit budget needs to be distributed across the sequences in ord...
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
MTA
2007
140views more  MTA 2007»
13 years 8 months ago
Motion mapping and mode decision for MPEG-2 to H.264/AVC transcoding
This paper describes novel transcoding techniques aimed for low-complexity MPEG-2 to H.264/AVC transcoding. An important application for this type of conversion is efficient stor...
Jun Xin, Jianjun Li, Anthony Vetro, Shun-ichi Seki...