Sciweavers

935 search results - page 123 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
SIGSOFT
2005
ACM
14 years 3 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...
MVA
2007
162views Computer Vision» more  MVA 2007»
13 years 9 months ago
Location-Based Tracking of Moving Obstacles from a Mobile Robot
Tracking moving obstacles from a moving platform is a useful skill for the coming generation of mobile robot. The methods used in existing moving objects tracking that operated fr...
Thatsaphan Suwannathat, Jun-ichi Imai, Masahide Ka...
DAC
1997
ACM
14 years 2 months ago
Static Timing Analysis of Embedded Software
This paper examines the problem of statically analyzing the performance of embedded software. This problem is motivated by the increasing growth of embedded systems and a lack of ...
Sharad Malik, Margaret Martonosi, Yau-Tsun Steven ...
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
14 years 10 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu