Sciweavers

1629 search results - page 309 / 326
» Infeasible Code Detection
Sort
View
IROS
2008
IEEE
148views Robotics» more  IROS 2008»
14 years 3 months ago
Identifying a moving object with an accelerometer in a camera view
— This paper proposes a method for identifying an object which contains an accelerometer out of many moving objects in the view of a stationary camera using motion data obtained ...
Osamu Shigeta, Shingo Kagami, Koichi Hashimoto
NDSS
2008
IEEE
14 years 3 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ISCA
2007
IEEE
198views Hardware» more  ISCA 2007»
14 years 3 months ago
Making the fast case common and the uncommon case simple in unbounded transactional memory
Hardware transactional memory has great potential to simplify the creation of correct and efficient multithreaded programs, allowing programmers to exploit more effectively the s...
Colin Blundell, Joe Devietti, E. Christopher Lewis...
ISCA
2007
IEEE
149views Hardware» more  ISCA 2007»
14 years 3 months ago
An effective hybrid transactional memory system with strong isolation guarantees
We propose signature-accelerated transactional memory (SigTM), a hybrid TM system that reduces the overhead of software transactions. SigTM uses hardware signatures to track the r...
Chi Cao Minh, Martin Trautmann, JaeWoong Chung, Au...
IWPSE
2007
IEEE
14 years 3 months ago
Talking tests: an empirical assessment of the role of fit acceptance tests in clarifying requirements
The starting point for software evolution is usually a change request, expressing the new or updated requirements on the delivered system. The requirements specified in a change ...
Filippo Ricca, Marco Torchiano, Mariano Ceccato, P...