Sciweavers

16 search results - page 3 / 4
» Sound predictive race detection in polynomial time
Sort
View
CSFW
2007
IEEE
14 years 1 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
ICRA
2010
IEEE
119views Robotics» more  ICRA 2010»
13 years 6 months ago
Recognition of situation classes at road intersections
— The recognition and prediction of situations is an indispensable skill of future driver assistance systems. This study focuses on the recognition of situations involving two ve...
Eugen Kafer, Christoph Hermes, Christian Wöhl...
ICDCN
2009
Springer
14 years 2 months ago
Tracking Dynamics Using Sensor Networks: Some Recurring Themes
Abstract. Much of the data consumed today is dynamic, typically gathered from distributed sources including sensors, and used in real-time monitoring and decision making applicatio...
Krithi Ramamritham
APPT
2009
Springer
14 years 2 months ago
Computational Performance of a Parallelized Three-Dimensional High-Order Spectral Element Toolbox
In this paper, a comprehensive performance review of an MPI-based high-order three-dimensional spectral element method C++ toolbox is presented. The focus is put on the performance...
Christoph Bosshard, Roland Bouffanais, Christian C...
BIOINFORMATICS
2011
13 years 2 months ago
Integrative network alignment reveals large regions of global network similarity in yeast and human
Motivation: High-throughput methods for detecting molecular interactions have produced large sets of biological network data with much more yet to come. Analogous to sequence alig...
Oleksii Kuchaiev, Natasa Przulj