Sciweavers

3228 search results - page 414 / 646
» Computationally Sound Proofs
Sort
View
163
Voted
CVPR
2012
IEEE
13 years 6 months ago
Mobile object detection through client-server based vote transfer
Mobile platforms such as smart-phones and tablet computers have attained the technological capacity to perform tasks beyond their intended purposes. The steady increase of process...
Shyam Sunder Kumar, Min Sun, Silvio Savarese
131
Voted
PODS
2008
ACM
155views Database» more  PODS 2008»
16 years 3 months ago
The recovery of a schema mapping: bringing exchanged data back
A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the targ...
Marcelo Arenas, Jorge Pérez, Cristian River...
118
Voted
VMCAI
2009
Springer
15 years 10 months ago
A Scalable Memory Model for Low-Level Code
Abstract. Because of its critical importance underlying all other software, lowlevel system software is among the most important targets for formal verification. Low-level systems...
Zvonimir Rakamaric, Alan J. Hu
141
Voted
CSFW
2007
IEEE
15 years 10 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
133
Voted
ISCAS
2006
IEEE
162views Hardware» more  ISCAS 2006»
15 years 9 months ago
Silicon neurons that phase-lock
Abstract—We present a silicon neuron with a dynamic, active leak that enables precise spike-timing with respect to a time-varying input signal. Our neuron models the mammalian bu...
J. H. Wittig Jr., Kwabena Boahen