Sciweavers

5482 search results - page 1078 / 1097
» Logic Programming and Databases
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...
IROS
2009
IEEE
178views Robotics» more  IROS 2009»
14 years 2 months ago
Mobile robots for offshore inspection and manipulation
— This paper analyzes the potential to apply mobile service robots in offshore oil and gas producing environments. The required hardware and software components and abilities of ...
Matthias Bengel, Kai Pfeiffer, Birgit Graf, Alexan...
CCS
2007
ACM
14 years 1 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
CIVR
2007
Springer
169views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Whitened LDA for face recognition
Over the years, many Linear Discriminant Analysis (LDA) algorithms have been proposed for the study of high dimensional data in a large variety of problems. An intrinsic limitatio...
Vo Dinh Minh Nhat, Sungyoung Lee, Hee Yong Youn
ICALP
2007
Springer
14 years 1 months ago
Universal Algebra and Hardness Results for Constraint Satisfaction Problems
We present algebraic conditions on constraint languages Γ that ensure the hardness of the constraint satisfaction problem CSP(Γ) for complexity classes L, NL, P, NP and ModpL. Th...
Benoit Larose, Pascal Tesson
« Prev « First page 1078 / 1097 Last » Next »