Sciweavers

7827 search results - page 1466 / 1566
» time 2007
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
AGILEDC
2007
IEEE
15 years 11 months ago
Growing a Build Management System from Seed
This paper describes the authors’ experiences creating a full Build Management System from a simple Version Control System. We will explore how the XP values of simplicity, feed...
Narti Kitiyakara, Joseph Graves
AICCSA
2007
IEEE
124views Hardware» more  AICCSA 2007»
15 years 11 months ago
The Maximum Common Subgraph Problem: Faster Solutions via Vertex Cover
In the maximum common subgraph (MCS) problem, we are given a pair of graphs and asked to find the largest induced subgraph common to them both. With its plethora of applications,...
Faisal N. Abu-Khzam, Nagiza F. Samatova, Mohamad A...
APCSAC
2007
IEEE
15 years 11 months ago
Runtime Performance Projection Model for Dynamic Power Management
In this paper, a runtime performance projection model for dynamic power management is proposed. The model is built as a first-order linear equation using a linear regression model....
Sang Jeong Lee, Hae-Kag Lee, Pen-Chung Yew
ASIAMS
2007
IEEE
15 years 11 months ago
Rough-Fuzzy Granulation, Rough Entropy and Image Segmentation
This talk has two parts explaining the significance of Rough sets in granular computing in terms of rough set rules and in uncertainty handling in terms of lower and upper approxi...
Sankar K. Pal
« Prev « First page 1466 / 1566 Last » Next »