Sciweavers

1145 search results - page 82 / 229
» The Correctness of an Optimized Code Generation
Sort
View
USS
2008
13 years 11 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
ICN
2001
Springer
14 years 1 months ago
A System Level Framework for Streaming 3-D Meshes over Packet Networks
In this paper, a system-level framework is proposed for 3-D graphics streaming. The proposed architecture is scalable with respect to the variations in both bandwidth and channel e...
Ghassan Al-Regib, Yucel Altunbasak
IPPS
2009
IEEE
14 years 3 months ago
Flexible pipelining design for recursive variable expansion
Many image and signal processing kernels can be optimized for performance consuming a reasonable area by doing loops parallelization with extensive use of pipelining. This paper p...
Zubair Nawaz, Thomas Marconi, Koen Bertels, Todor ...
GLOBECOM
2009
IEEE
14 years 24 days ago
Experimental Validation of Periodic Codes for PON Monitoring
In this paper we investigate both experimentally and via simulation the monitoring of fiber link quality in a PON using optical coding technology. We use a new, simple and costeffe...
Mohammad M. Rad, Habib Fathallah, Sophie LaRochell...
ESTIMEDIA
2004
Springer
14 years 2 months ago
A hardware accelerator IP for EBCOT Tier-1 coding in JPEG2000 Standard
We proposed a hardware accelerator IP for the Tier-1 portion of Embedded Block Coding with Optimal Truncation (EBCOT) used in the JPEG2000 next generation image compression standa...
Tien-Wei Hsieh, Youn-Long Lin