Sciweavers

1240 search results - page 215 / 248
» Improving Memory Management Security for C and C
Sort
View
MINENET
2005
ACM
14 years 2 months ago
Shrink: a tool for failure diagnosis in IP networks
Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneo...
Srikanth Kandula, Dina Katabi, Jean-Philippe Vasse...
DAGM
2005
Springer
14 years 2 months ago
Three-Dimensional Shape Knowledge for Joint Image Segmentation and Pose Estimation
Abstract. This paper presents the integration of 3D shape knowledge into a variational model for level set based image segmentation and tracking. Having a 3D surface model of an ob...
Thomas Brox, Bodo Rosenhahn, Joachim Weickert
SAC
2004
ACM
14 years 2 months ago
Missing requirements and relationship discovery through proxy viewpoints model
This paper addresses the problem of “missing requirements” in software requirements specification (SRS) expressed in natural language. Due to rapid changes in technology and b...
Seok Won Lee, David C. Rine
ICSR
2004
Springer
14 years 2 months ago
Validating Quality of Service for Reusable Software Via Model-Integrated Distributed Continuous Quality Assurance
Quality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. ...
Arvind S. Krishna, Douglas C. Schmidt, Atif M. Mem...
ISCA
2003
IEEE
107views Hardware» more  ISCA 2003»
14 years 2 months ago
Positional Adaptation of Processors: Application to Energy Reduction
Although adaptive processors can exploit application variability to improve performance or save energy, effectively managing their adaptivity is challenging. To address this probl...
Michael C. Huang, Jose Renau, Josep Torrellas