Sciweavers

2659 search results - page 452 / 532
» Do we mean the same
Sort
View
ICCS
2007
Springer
15 years 10 months ago
Detecting Invisible Relevant Persons in a Homogeneous Social Network
Abstract. An algorithm to detect invisible relevant persons in a homogeneous social network is studied with computer simulation. The network is effective as a model for contempora...
Yoshiharu Maeno, Kiichi Ito, Yukio Ohsawa
OOPSLA
2007
Springer
15 years 10 months ago
Ilea: inter-language analysis across java and c
Java bug finders perform static analysis to find implementation mistakes that can lead to exploits and failures; Java compilers perform static analysis for optimization. If Java...
Gang Tan, Greg Morrisett
DFT
2006
IEEE
130views VLSI» more  DFT 2006»
15 years 10 months ago
Off-Chip Control Flow Checking of On-Chip Processor-Cache Instruction Stream
Control flow checking (CFC) is a well known concurrent checking technique for ensuring that a program’s instruction execution sequence follows permissible paths. Almost all CFC...
Federico Rota, Shantanu Dutt, Sahithi Krishna
ICRA
2006
IEEE
156views Robotics» more  ICRA 2006»
15 years 10 months ago
Depth Perception in an Anthropomorphic Robot that replicates Human Eye Movements
— In the eyes of many species, the optical nodal points of the cornea and lens do not lie on the axes of rotation of the eye. During eye movements, this lack of alignment produce...
Fabrizio Santini, Michele Rucci
ASPLOS
2006
ACM
15 years 10 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...