Sciweavers

1056 search results - page 39 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
CAV
2000
Springer
125views Hardware» more  CAV 2000»
13 years 11 months ago
Efficient Reachability Analysis of Hierarchical Reactive Machines
Hierarchical state machines is a popular visual formalism for software specifications. To apply automated analysis to such specifications, the traditional approach is to compile th...
Rajeev Alur, Radu Grosu, Michael McDougall
BMVC
2002
13 years 10 months ago
Detecting Planes In An Uncalibrated Image Pair
Plane detection is a prerequisite to a wide variety of vision tasks. This paper proposes a novel method that exploits results from projective geometry to automatically detect plan...
Manolis I. A. Lourakis, Antonis A. Argyros, Stelio...
IJSSE
2010
80views more  IJSSE 2010»
13 years 5 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...
CORR
2011
Springer
173views Education» more  CORR 2011»
13 years 2 months ago
Probability Based Clustering for Document and User Properties
Information Retrieval systems can be improved by exploiting context information such as user and document features. This article presents a model based on overlapping probabilistic...
Thomas Mandl, Christa Womser-Hacker
ICDE
2011
IEEE
224views Database» more  ICDE 2011»
12 years 11 months ago
SmartTrace: Finding similar trajectories in smartphone networks without disclosing the traces
—In this demonstration paper, we present a powerful distributed framework for finding similar trajectories in a smartphone network, without disclosing the traces of participatin...
Costandinos Costa, Christos Laoudias, Demetrios Ze...