Sciweavers

550 search results - page 35 / 110
» Complementarity of Error Detection Techniques
Sort
View
DAC
2005
ACM
14 years 8 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
ESWS
2009
Springer
14 years 2 months ago
Ontology Integration Using Mappings: Towards Getting the Right Logical Consequences
Abstract. We propose a general method and novel algorithmic techniques to facilitate the integration of independently developed ontologies using mappings. Our method and techniques...
Ernesto Jiménez-Ruiz, Bernardo Cuenca Grau,...
DAGM
1997
Springer
13 years 12 months ago
A Tensor Approach for Precise Computation of Dense Displacement Vector Fields
Using the 3-dimensional structure tensor, dense displacement vector fields (DVF) can be computed with subpixel accuracy. The approach is based on the detection of linear symmetrie...
Horst Haußecker, Bernd Jähne
VLDB
2005
ACM
125views Database» more  VLDB 2005»
14 years 1 months ago
Using Association Rules for Fraud Detection in Web Advertising Networks
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
CAV
2012
Springer
334views Hardware» more  CAV 2012»
11 years 10 months ago
Joogie: Infeasible Code Detection for Java
We present Joogie, a tool that detects infeasible code in Java programs. Infeasible code is code that does not occur on feasible controlflow paths and thus has no feasible executi...
Stephan Arlt, Martin Schäf