Sciweavers

2421 search results - page 455 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
NDSS
2008
IEEE
14 years 4 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 4 months ago
Impact of Sampling Jitter on Mostly-Digital Architectures for UWB Bio-Medical Applications
Abstract— Ultra-wideband (UWB) impulse radio is a promising technique for low-power bio-medical communication systems. While a range of analog and digital UWB architectures exist...
Andrew Fort, Mike Chen, Robert W. Brodersen, Claud...
MM
2004
ACM
170views Multimedia» more  MM 2004»
14 years 3 months ago
Effective automatic image annotation via a coherent language model and active learning
Image annotations allow users to access a large image database with textual queries. There have been several studies on automatic image annotation utilizing machine learning techn...
Rong Jin, Joyce Y. Chai, Luo Si
LISA
2007
14 years 5 days ago
Application Buffer-Cache Management for Performance: Running the World's Largest MRTG
An operating system’s readahead and buffer-cache behaviors can significantly impact application performance; most often these better performance, but occasionally they worsen it...
David Plonka, Archit Gupta, Dale Carder
FM
2008
Springer
152views Formal Methods» more  FM 2008»
13 years 11 months ago
Constraint Prioritization for Efficient Analysis of Declarative Models
The declarative modeling language Alloy and its automatic analyzer provide an effective tool-set for building designs of systems and checking their properties. The Alloy Analyzer p...
Engin Uzuncaova, Sarfraz Khurshid