Sciweavers

166 search results - page 16 / 34
» Mathematical programming approaches for generating p-efficie...
Sort
View
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 1 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
SMI
2008
IEEE
116views Image Analysis» more  SMI 2008»
14 years 2 months ago
Self-organizing primitives for automated shape composition
Motivated by the ability of living cells to form into specific shapes and structures, we present a new approach to shape modeling based on self-organizing primitives whose behavi...
Linge Bai, Manolya Eyiyurekli, David E. Breen
CAD
2005
Springer
13 years 7 months ago
Parameterization and parametric design of mannequins
This paper presents a novel feature based parameterization approach of human bodies from the unorganized cloud points and the parametric design method for generating new models ba...
Charlie C. L. Wang
CORR
2011
Springer
143views Education» more  CORR 2011»
12 years 11 months ago
Probabilistic Logic: Many-valuedness and Intensionality
The probability theory is a well-studied branch of mathematics, in order to carry out formal reasoning about probability. Thus, it is important to have a logic, both for computati...
Zoran Majkic
TACAS
2010
Springer
146views Algorithms» more  TACAS 2010»
14 years 2 months ago
Ranking Function Synthesis for Bit-Vector Relations
Ranking function synthesis is a key aspect to the success of modern termination provers for imperative programs. While it is wellknown how to generate linear ranking functions for ...
Byron Cook, Daniel Kroening, Philipp Rümmer, ...