Sciweavers

285 search results - page 32 / 57
» Systematic evaluation of e-learning systems: an experimental...
Sort
View
DATE
2008
IEEE
117views Hardware» more  DATE 2008»
14 years 2 months ago
Architecture Exploration of NAND Flash-based Multimedia Card
In this paper, we present an architecture exploration methodology for low-end embedded systems where the reduction of cost is a primary design concern. The architecture exploratio...
Sungchan Kim, Chanik Park, Soonhoi Ha
POPL
2006
ACM
14 years 8 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
ATAL
2008
Springer
13 years 10 months ago
Physical parameter optimization in swarms of ultra-low complexity agents
Physical agents (such as wheeled vehicles, UAVs, hovercraft, etc.) with simple control systems are often sensitive to changes in their physical design and control parameters. As s...
Ryan Connaughton, Paul W. Schermerhorn, Matthias S...
TCSV
2008
150views more  TCSV 2008»
13 years 8 months ago
Robust Video Fingerprinting for Content-Based Video Identification
Video fingerprints are feature vectors that uniquely characterize one video clip from another. The goal of video fingerprinting is to identify a given video query in a database (DB...
Sunil Lee, Chang Dong Yoo
ICSE
2009
IEEE-ACM
14 years 3 months ago
Complete and accurate clone detection in graph-based models
Model-Driven Engineering (MDE) has become an important development framework for many large-scale software. Previous research has reported that as in traditional code-based develo...
Nam H. Pham, Hoan Anh Nguyen, Tung Thanh Nguyen, J...