Sciweavers

239 search results - page 42 / 48
» Object substitution masking
Sort
View
ASPDAC
2005
ACM
103views Hardware» more  ASPDAC 2005»
13 years 10 months ago
MAIA: a framework for networks on chip generation and verification
- The increasing complexity of SoCs makes networks on chip (NoC) a promising substitute for busses and dedicated wires interconnection schemes. However, new tools need to be develo...
Luciano Ost, Aline Mello, José Palma, Ferna...
ECIR
2010
Springer
13 years 8 months ago
Analyzing Information Retrieval Methods to Recover Broken Web Links
In this work we compare different techniques to automatically find candidate web pages to substitute broken links. We extract information from the anchor text, the content of the p...
Juan Martinez-Romo, Lourdes Araujo
AR
2008
143views more  AR 2008»
13 years 8 months ago
Toward Human-Like Real-Time Manipulation: From Perception to Motion Planning
Human-like behavior is crucial for intelligent service robots that are to perform versatile tasks in day to day life. In this paper, an integrated approach to human-like manipulat...
Sukhan Lee, Hadi Moradi, Daesik Jang, Han-Young Ja...
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 8 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
COMGEO
2006
ACM
13 years 8 months ago
Inner and outer rounding of Boolean operations on lattice polygonal regions
Robustness problems due to the substitution of the exact computation on real numbers by the rounded floating point arithmetic are often an obstacle to obtain practical implementat...
Olivier Devillers, Philippe Guigue