Sciweavers

4307 search results - page 681 / 862
» Dynamic Spyware Analysis
Sort
View
HYBRID
2003
Springer
14 years 3 months ago
Mode Reconstruction for Source Coding and Multi-modal Control
s of Invited Presentations The Mathematics of Matter and the Mathematics of Mind . . . . . . . . . . . . . 1 David Berlinski A Grand Challenge: Full Reactive Modeling of a Multi-ce...
Adam Austin, Magnus Egerstedt
ICSE
2010
IEEE-ACM
14 years 2 months ago
From behaviour preservation to behaviour modification: constraint-based mutant generation
The efficacy of mutation analysis depends heavily on its capability to mutate programs in such a way that they remain executable and exhibit deviating behaviour. Whereas the forme...
Friedrich Steimann, Andreas Thies
DAC
1998
ACM
14 years 2 months ago
Buffer Insertion for Noise and Delay Optimization
Interconnect-driven optimization is an increasingly important step in high-performance design. Algorithms for buffer insertion have been successfully utilized to reduce delay in gl...
Charles J. Alpert, Anirudh Devgan, Stephen T. Quay
SIGIR
2010
ACM
14 years 1 months ago
Entity information management in complex networks
Entity information management (EIM) is a nascent IR research area that investigates the information management process about entities instead of documents. It is motivated by the ...
Yi Fang
NIPS
2007
13 years 11 months ago
Receptive Fields without Spike-Triggering
Stimulus selectivity of sensory neurons is often characterized by estimating their receptive field properties such as orientation selectivity. Receptive fields are usually deriv...
Jakob Macke, Guenther Zeck, Matthias Bethge