Sciweavers

872 search results - page 107 / 175
» UML-based design test generation
Sort
View
CVPR
2011
IEEE
14 years 11 months ago
Real-time Human Pose Recognition in Parts from Single Depth Images
We propose a new method to quickly and accurately predict 3D positions of body joints from a single depth image, using no temporal information. We take an object recognition appro...
Jamie Shotton, Andrew Fitzgibbon, Mat Cook, Andrew...
CCS
2011
ACM
14 years 3 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
ICFEM
2009
Springer
15 years 1 months ago
Graded-CTL: Satisfiability and Symbolic Model Checking
In this paper we continue the study of a strict extension of the Computation Tree Logic, called graded-CTL, recently introduced by the same authors. This new logic augments the sta...
Alessandro Ferrante, Margherita Napoli, Mimmo Pare...
132
Voted
CEC
2007
IEEE
15 years 10 months ago
Non-separable fitness functions for evolutionary shape optimization benchmarking
—Target shape matching can be used as a quick and easy surrogate task when evaluating optimization algorithms intended for computationally expensive tasks, such as turbine blade ...
Tim A. Yates, Thorsten Schnier
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 7 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...