Sciweavers

181 search results - page 8 / 37
» Negative selection algorithms without generating detectors
Sort
View
CGO
2010
IEEE
14 years 2 months ago
Integrated instruction selection and register allocation for compact code generation exploiting freeform mixing of 16- and 32-bi
For memory constrained embedded systems code size is at least as important as performance. One way of increasing code density is to exploit compact instruction formats, e.g. ARM T...
Tobias J. K. Edler von Koch, Igor Böhm, Bj&ou...
JSS
2006
80views more  JSS 2006»
13 years 7 months ago
Polyhedral space generation and memory estimation from interface and memory models of real-time video systems
We present a tool and a methodology for estimating the memory storage requirement for synchronous real-time video processing systems. Typically, a designer will use the feedback i...
Benny Thörnberg, Qubo Hu, Martin Palkovic, Ma...
CSFW
2007
IEEE
14 years 1 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
ICASSP
2011
IEEE
12 years 11 months ago
Phoneme selective speech enhancement using the generalized parametric spectral subtraction estimator
In this study, the generalized parametric spectral subtraction estimator is employed in the context of a ROVER speech enhancement framework to develop a robust phoneme class selec...
Amit Das, John H. L. Hansen
ICIP
2007
IEEE
14 years 9 months ago
Geometric Calibration of Third-Generation Computed Tomography Scanners from Scans of Unknown Objects using Complementary Rays
To achieve good image quality for computed tomography scans, it is important to accurately know the geometrical relationship between the x-ray source, detector, and axis of rotati...
Kevin M. Holt