Sciweavers

481 search results - page 81 / 97
» Toward an Abstract Computer Virology
Sort
View
ICB
2007
Springer
148views Biometrics» more  ICB 2007»
14 years 2 months ago
Walker Recognition Without Gait Cycle Estimation
Abstract. Most of gait recognition algorithms involve walking cycle estimation to accomplish signature matching. However, we may be plagued by two cycle-related issues when develop...
Daoliang Tan, Shiqi Yu, Kaiqi Huang, Tieniu Tan
IH
2007
Springer
14 years 2 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
APCSAC
2006
IEEE
14 years 2 months ago
Functional Unit Chaining: A Runtime Adaptive Architecture for Reducing Bypass Delays
Abstract. Bypass delays are expected to grow beyond 1ns as technology scales. These delays necessitate pipelining of bypass paths at processor frequencies above 1GHz and thus affe...
Lih Wen Koh, Oliver Diessel
WIOPT
2006
IEEE
14 years 1 months ago
On the macroscopic effects of local interactions in multi-hop wireless networks
Abstract— The objective of the paper is to provide qualitative insight into the global effects of distributed mechanisms, such as carrier sense multiple access (CSMA) and rate co...
Venkatesh Saligrama, David Starobinski
ATAL
2005
Springer
14 years 1 months ago
Design by Contract Deontic Design Language for Multiagent Systems
Abstract. Design by contract is a well known theory that views software construction as based on contracts between clients (callers) and suppliers (routines), relying on mutual obl...
Christophe Garion, Leendert van der Torre