Sciweavers

399 search results - page 53 / 80
» Efficient Model Checking Using Tabled Resolution
Sort
View
DDECS
2006
IEEE
146views Hardware» more  DDECS 2006»
14 years 9 days ago
Automatic Identification of Timing Anomalies for Cycle-Accurate Worst-Case Execution Time Analysis
Abstract-- Hard real-time systems need methods to determine upper bounds for their execution times, usually called worst-case execution times. Timing anomalies are counterintuitive...
Jochen Eisinger, Ilia Polian, Bernd Becker, Alexan...
PAMI
2006
196views more  PAMI 2006»
13 years 8 months ago
Three-Dimensional Model-Based Object Recognition and Segmentation in Cluttered Scenes
Viewpoint independent recognition of free-form objects and their segmentation in the presence of clutter and occlusions is a challenging task. We present a novel 3D model-based alg...
Ajmal S. Mian, Mohammed Bennamoun, Robyn A. Owens
DAC
2009
ACM
14 years 9 months ago
Computing bounds for fault tolerance using formal techniques
Continuously shrinking feature sizes result in an increasing susceptibility of circuits to transient faults, e.g. due to environmental radiation. Approaches to implement fault tol...
André Sülflow, Görschwin Fey, Rol...
JAIR
2010
181views more  JAIR 2010»
13 years 3 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
SMI
2010
IEEE
165views Image Analysis» more  SMI 2010»
13 years 6 months ago
Designing a Topological Modeler Kernel: A Rule-Based Approach
In this article, we present a rule-based language dedicated to topological operations, based on graph transformations. Generalized maps are described as a particular class of graph...
Thomas Bellet, Mathieu Poudret, Agnès Arnou...