Sciweavers

265 search results - page 48 / 53
» On the Intersection of XPath Expressions
Sort
View
CVPR
2005
IEEE
14 years 9 months ago
On the Absolute Quadratic Complex and Its Application to Autocalibration
This article introduces the absolute quadratic complex formed by all lines that intersect the absolute conic. If denotes the 3 ? 3 symmetric matrix representing the image of that ...
Jean Ponce, Kenton McHenry, Théodore Papado...
ICIP
2001
IEEE
14 years 9 months ago
Synthesis and applications of lattice image operators based on fuzzy norms
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that can be expressed as nonli...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...
KBSE
2009
IEEE
14 years 2 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
ATVA
2009
Springer
172views Hardware» more  ATVA 2009»
14 years 1 months ago
Symbolic CTL Model Checking of Asynchronous Systems Using Constrained Saturation
Abstract. The saturation state-space generation algorithm has demonstrated clear improvements over state-of-the-art symbolic methods for asynchronous systems. This work is motivate...
Yang Zhao, Gianfranco Ciardo
OTM
2007
Springer
14 years 1 months ago
Policy-Based Service Registration and Discovery
The WS-Policy framework has been introduced to allow policy to be expressed and associated with Web Services thereby enabling organizations to manage the quality of their services...
Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringe...