Sciweavers

5009 search results - page 868 / 1002
» Value chain modelling using system dynamics
Sort
View
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
14 years 2 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
TON
2010
167views more  TON 2010»
13 years 4 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
ECCV
2002
Springer
15 years 1 days ago
Learning Shape from Defocus
We present a novel method for inferring three-dimensional shape from a collection of defocused images. It is based on the observation that defocused images are the null-space of ce...
Paolo Favaro, Stefano Soatto
CAV
1999
Springer
119views Hardware» more  CAV 1999»
14 years 2 months ago
Exploiting Positive Equality in a Logic of Equality with Uninterpreted Functions
Abstract. In using the logic of equality with unininterpreted functions to verify hardware systems, specific characteristics of the formula describing the correctness condition ca...
Randal E. Bryant, Steven M. German, Miroslav N. Ve...
VISUALIZATION
1997
IEEE
14 years 2 months ago
Volume rendering of abdominal aortic aneurysms
Volume rendering is a valuable and important technique for scientific visualization. One well known application area is the reconstruction and visualization of output from medica...
Roger C. Tam, Christopher G. Healey, Borys Flak, P...