Sciweavers

1191 search results - page 41 / 239
» Distributed Detection of Information Flows
Sort
View
DAC
2006
ACM
14 years 9 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...
KBSE
2007
IEEE
14 years 3 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ICCCN
2007
IEEE
14 years 3 months ago
Motion-based Background Modeling for Moving Object Detection on Moving Platforms
— A method to detect moving objects on non-stationary background is proposed. The concurrent motions of foreground and background pixels make it extremely difficult to maintain a...
Ming-Yu Shih, Yao-Jen Chang, Bwo-Chau Fu, Chingchu...
AAAI
2004
13 years 10 months ago
Visual Odometry Using Commodity Optical Flow
A wide variety of techniques for visual navigation using robot-mounted cameras have been described over the past several decades, yet adoption of optical flow navigation technique...
Jason Campbell, Rahul Sukthankar, Illah R. Nourbak...
BMCBI
2008
132views more  BMCBI 2008»
13 years 9 months ago
Clustering ionic flow blockade toggles with a Mixture of HMMs
Background: Ionic current blockade signal processing, for use in nanopore detection, offers a promising new way to analyze single molecule properties with potential implications f...
Alexander G. Churbanov, Stephen Winters-Hilt