Sciweavers

169 search results - page 22 / 34
» From Operating-System Correctness to Pervasively Verified Ap...
Sort
View
ICSE
2003
IEEE-ACM
14 years 10 months ago
Cadena: An Integrated Development, Analysis, and Verification Environment for Component-based Systems
The use of component models such as Enterprise Java Beans and the CORBA Component Model (CCM) in application development is expanding rapidly. Even in real-time safety/mission-cri...
John Hatcliff, Xianghua Deng, Matthew B. Dwyer, Ge...
WORM
2003
13 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
MOBISYS
2004
ACM
14 years 10 months ago
NWSLite: A Light-Weight Prediction Utility for Mobile Devices
Computation off-loading, i.e., remote execution, has been shown to be effective for extending the computational power and battery life of resource-restricted devices, e.g., hand-h...
Selim Gurun, Chandra Krintz, Richard Wolski
NAACL
2007
13 years 11 months ago
Automatic Assessment of Student Translations for Foreign Language Tutoring
This paper introduces the use of speech translation technology for a new type of voice-interactive Computer Aided Language Learning (CALL) application. We describe a computer game...
Chao Wang, Stephanie Seneff
CVPR
2007
IEEE
15 years 12 days ago
Multimodal Tracking for Smart Videoconferencing and Video Surveillance
Many applications require the ability to track the 3-D motion of the subjects. We build a particle filter based framework for multimodal tracking using multiple cameras and multip...
Dmitry N. Zotkin, Vikas C. Raykar, Ramani Duraiswa...