Sciweavers

875 search results - page 32 / 175
» DAWN for component based systems - just a different perspect...
Sort
View
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
ESTIMEDIA
2003
Springer
14 years 26 days ago
A Component Oriented Simulator for HW/SW Co-Designs
In order to extensively explore design space one has to specify a n a very abstract level. Transforming a specification into a correct implementation is usually an error prone tas...
Alexander Paar, Haitao Du, Nader Bagherzadeh
IRI
2003
IEEE
14 years 27 days ago
A Formal Framework for Design Component Contracts
– Building large software systems out of existing software components can save time and cost. These software components range from architectural and design components to binary c...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
GI
2004
Springer
14 years 1 months ago
Dynamical Vertical Integration of Distributed Java Components Using an Architecture Model
Abstract: A key idea of architecture is the description of components and their connections. This information can be extended to define the horizontal and vertical distribution of...
Alexander Prack, Ulf Schreier
AMDO
2008
Springer
13 years 9 months ago
View-Invariant Human Action Detection Using Component-Wise HMM of Body Parts
This paper presents a framework for view-invariant action recognition in image sequences. Feature-based human detection becomes extremely challenging when the agent is being observ...
Bhaskar Chakraborty, Marco Pedersoli, Jordi Gonz&a...