Sciweavers

1710 search results - page 271 / 342
» High-Level Programs and Program Conditions
Sort
View
LR
2011
107views more  LR 2011»
13 years 3 days ago
Modeling and stability analysis of autonomously controlled production networks
Abstract We present methods and tools for modeling autonomously controlled production networks and investigation of their stability properties. Production networks are described as...
Sergey Dashkovskiy, Michael Görges, Michael K...
ESORICS
2011
Springer
12 years 9 months ago
Linear Obfuscation to Combat Symbolic Execution
Abstract. Trigger-based code (malicious in many cases, but not necessarily) only executes when specific inputs are received. Symbolic execution has been one of the most powerful t...
Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
CVPR
2012
IEEE
11 years 11 months ago
A simple prior-free method for non-rigid structure-from-motion factorization
This paper proposes a simple “prior-free” method for solving non-rigid structure-from-motion factorization problems. Other than using the basic low-rank condition, our method ...
Yuchao Dai, Hongdong Li, Mingyi He
CHI
2008
ACM
14 years 9 months ago
Usability evaluation considered harmful (some of the time)
Current practice in Human Computer Interaction as encouraged by educational institutes, academic review processes, and institutions with usability groups advocate usability evalua...
Saul Greenberg, William Buxton
EUROSYS
2009
ACM
14 years 6 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos