Sciweavers

11718 search results - page 2083 / 2344
» Testing database applications
Sort
View
128
Voted
ICLP
2010
Springer
15 years 6 months ago
Methods and Methodologies for Developing Answer-Set Programs - Project Description
Answer-set programming (ASP) is a well-known formalism for declarative problem solving, enjoying a continuously increasing number of diverse applications. However, arguably one of ...
Johannes Oetsch, Jörg Pührer, Hans Tompi...
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 6 months ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...
133
Voted
GLOBECOM
2007
IEEE
15 years 6 months ago
CAC for Multibeam Opportunistic Schemes in Heterogeneous WiMax Systems Under QoS Constraints
Spatial scheduling in a heterogeneous WiMax Downlink channel, based on partial Channel State Information at the Transmitter (CSIT), is carried out through a multibeam opportunistic...
Nizar Zorba, Ana I. Pérez-Neira
137
Voted
EMMCVPR
2009
Springer
15 years 6 months ago
Reconstructing Optical Flow Fields by Motion Inpainting
An edge-sensitive variational approach for the restoration of optical flow fields is presented. Real world optical flow fields are frequently corrupted by noise, reflection artifac...
Benjamin Berkels, Claudia Kondermann, Christoph S....
GLVLSI
2007
IEEE
151views VLSI» more  GLVLSI 2007»
15 years 6 months ago
Hand-in-hand verification of high-level synthesis
This paper describes a formal verification methodology of highnthesis (HLS) process. The abstraction level of the input to HLS is so high compared to that of the output that the v...
Chandan Karfa, Dipankar Sarkar, Chittaranjan A. Ma...
« Prev « First page 2083 / 2344 Last » Next »