Sciweavers

12610 search results - page 2363 / 2522
» Recognition using Regions
Sort
View
ASPLOS
2006
ACM
15 years 10 months ago
AVIO: detecting atomicity violations via access interleaving invariants
Concurrency bugs are among the most difficult to test and diagnose of all software bugs. The multicore technology trend worsens this problem. Most previous concurrency bug detect...
Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
VRCAI
2006
ACM
15 years 10 months ago
Erasing, digging and clipping in volumetric datasets with one or two hands
Visualization of volumetric datasets is common in many fields and has been an active area of research in the past two decades. In spite of developments in volume visualization te...
Rafael Huff, Carlos A. Dietrich, Luciana Porcher N...
DSN
2005
IEEE
15 years 10 months ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion
SSDBM
2005
IEEE
122views Database» more  SSDBM 2005»
15 years 10 months ago
Detection and Tracking of Discrete Phenomena in Sensor-Network Databases
This paper introduces a framework for Phenomena Detection and Tracking (PDT, for short) in sensor network databases. Examples of detectable phenomena include the propagation over ...
Mohamed H. Ali, Mohamed F. Mokbel, Walid G. Aref, ...
120
Voted
SYNASC
2005
IEEE
86views Algorithms» more  SYNASC 2005»
15 years 10 months ago
One and Two Polarizations, Membrane Creation and Objects Complexity in P Systems
We improve, by using register machines, some existing universality results for specific models of P systems. P systems with membrane creation are known to generate all recursivel...
Artiom Alhazov, Rudolf Freund, Agustin Riscos-N&ua...
« Prev « First page 2363 / 2522 Last » Next »