Sciweavers

1466 search results - page 216 / 294
» Completeness of the Authentication Tests
Sort
View
CAV
2009
Springer
123views Hardware» more  CAV 2009»
13 years 12 months ago
On Using Floating-Point Computations to Help an Exact Linear Arithmetic Decision Procedure
We consider the decision problem for quantifier-free formulas whose atoms are linear inequalities interpreted over the reals or rationals. This problem may be decided using satisf...
David Monniaux
FPGA
2007
ACM
124views FPGA» more  FPGA 2007»
13 years 11 months ago
Efficient hardware checkpointing: concepts, overhead analysis, and implementation
Progress in reconfigurable hardware technology allows the implementation of complete SoCs in today's FPGAs. In the context design for reliability, software checkpointing is a...
Dirk Koch, Christian Haubelt, Jürgen Teich
ACSAC
2004
IEEE
13 years 11 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...
CICLING
2006
Springer
13 years 11 months ago
A General and Multi-lingual Phrase Chunking Model Based on Masking Method
Several phrase chunkers have been proposed over the past few years. Some state-of-the-art chunkers achieved better performance via integrating external resources, e.g., parsers and...
Yu-Chieh Wu, Chia-Hui Chang, Yue-Shi Lee
CLEAR
2006
Springer
116views Biometrics» more  CLEAR 2006»
13 years 11 months ago
Multi-and Single View Multiperson Tracking for Smart Room Environments
Abstract. Simultaneous tracking of multiple persons in real world environments is an active research field and several approaches have been proposed, based on a variety of features...
Keni Bernardin, Tobias Gehrig, Rainer Stiefelhagen