Sciweavers

988 search results - page 42 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
DSN
2008
IEEE
14 years 3 months ago
Using likely program invariants to detect hardware errors
In the near future, hardware is expected to become increasingly vulnerable to faults due to continuously decreasing feature size. Software-level symptoms have previously been used...
Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandr...
AAAI
2000
13 years 10 months ago
The Game of Hex: An Automatic Theorem Proving Approach to Game Programming
The game of Hex is a two-player game with simple rules, a deep underlying mathematical beauty, and a strategic complexity comparable to that of Chess and Go. The massive game-tree...
Vadim V. Anshelevich
IEEEPACT
1998
IEEE
14 years 1 months ago
Parallelization of Benchmarks for Scalable Shared-Memory Multiprocessors
This work identifies practical compiling techniques for scalable shared memory machines. For this, we have focused on experimental studies using a real machine and representative ...
Yunheung Paek, Angeles G. Navarro, Emilio L. Zapat...
ECCV
1996
Springer
14 years 10 months ago
Object Recognition Using Multidimensional Receptive Field Histograms
This paper presents a technique to determine the identity of objects in a scene using histograms of the responses of a vector of local linear neighborhood operators (receptive elds...
Bernt Schiele, James L. Crowley
CCCG
2006
13 years 10 months ago
On Planar Path Transformation
A flip or edge-replacement is considered as a transformation by which one edge e of a geometric object is removed and an edge f (f = e) is inserted such that the resulting object ...
Kamrul Islam, Selim G. Akl, Henk Meijer