Sciweavers

2621 search results - page 419 / 525
» Near orders and codes
Sort
View
ACIVS
2007
Springer
15 years 11 months ago
Multiview Depth-Image Compression Using an Extended H.264 Encoder
This paper presents a predictive-coding algorithm for the compression of multiple depth-sequences obtained from a multi-camera acquisition setup. The proposed depth-prediction algo...
Yannick Morvan, Dirk Farin, Peter H. N. de With
AGTIVE
2007
Springer
15 years 11 months ago
Aspect Diagrams for UML Activity Models
Abstract. Aspect-orientation has gained increasing popularity, especially within the programming domain, with textual-based approaches such as AspectJ. Aspect-orientation provides ...
Roy Grønmo, Birger Møller-Pedersen
ECOOP
2007
Springer
15 years 11 months ago
A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Our work is based on tracematches, an extension to...
Eric Bodden, Laurie J. Hendren, Ondrej Lhotá...
122
Voted
EMSOFT
2007
Springer
15 years 11 months ago
E-FRP with priorities
E-FRP is declarative language for programming resourcebounded, event-driven systems. The original high-level semantics of E-FRP requires that each event handler execute atomically...
Roumen Kaiabachev, Walid Taha, Angela Yun Zhu
ESORICS
2007
Springer
15 years 11 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...