Sciweavers

1821 search results - page 311 / 365
» Security-Aware Program Transformations
Sort
View
TASE
2008
IEEE
13 years 8 months ago
On Clamping Planning in Workpiece-Fixture Systems
Deformation at contacts between the workpiece and locators/clamps resulting from large contact forces causes overall workpiece displacement, and affects the localization accuracy o...
Caihua Xiong, Michael Yu Wang, You-Lun Xiong
ASE
2005
137views more  ASE 2005»
13 years 8 months ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund
OOPSLA
2010
Springer
13 years 7 months ago
Supporting dynamic, third-party code customizations in JavaScript using aspects
Web sites and web browsers have recently evolved into platforms on top of which entire applications are delivered dynamically, mostly as JavaScript source code. This delivery form...
Benjamin S. Lerner, Herman Venter, Dan Grossman
PPDP
2010
Springer
13 years 6 months ago
Rewrite-based verification of XML updates
We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree lang...
Florent Jacquemard, Michaël Rusinowitch
ICCV
2007
IEEE
14 years 10 months ago
Learning Auto-Structured Regressor from Uncertain Nonnegative Labels
In this paper, we take the human age and pose estimation problems as examples to study automatic designing regressor from training samples with uncertain nonnegative labels. First...
Shuicheng Yan, Huan Wang, Xiaoou Tang, Thomas S. H...