Sciweavers

2877 search results - page 472 / 576
» The Complexity of Planarity Testing
Sort
View
OOPSLA
2007
Springer
15 years 10 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
ICMCS
2006
IEEE
235views Multimedia» more  ICMCS 2006»
15 years 10 months ago
An Event-Driven Sports Video Adaptation for the MPEG-21 DIA Framework
We present an event-driven video adaptation system in this paper. Events are detected by audio/video analysis and annotated by the description schemes (DSs) provided by MPEG-7 Mul...
Min Xu, Jiaming Li, Yiqun Hu, Liang-Tien Chia, Bu-...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 9 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ICRA
2005
IEEE
184views Robotics» more  ICRA 2005»
15 years 9 months ago
3D Virtual Prototyping of Home Service Robots Using ASADAL/OBJ
– Typical robot development requires that hardware be mostly functional before significant software development begins. Utilizing virtual prototype of hardware and its environmen...
Kyo Chul Kang, Moonzoo Kim, Jaejoon Lee, Byungkil ...
ICAIL
2005
ACM
15 years 9 months ago
Effective Document Clustering for Large Heterogeneous Law Firm Collections
Computational resources for research in legal environments have historically implied remote access to large databases of legal documents such as case law, statutes, law reviews an...
Jack G. Conrad, Khalid Al-Kofahi, Ying Zhao, Georg...