Sciweavers

2623 search results - page 357 / 525
» tools 2010
Sort
View
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
14 years 25 days ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
FAST
2010
14 years 22 days ago
HydraFS: A High-Throughput File System for the HYDRAstor Content-Addressable Storage System
A content-addressable storage (CAS) system is a valuable tool for building storage solutions, providing efficiency by automatically detecting and eliminating duplicate blocks; it ...
Cristian Ungureanu, Benjamin Atkin, Akshat Aranya,...
ICPR
2010
IEEE
14 years 12 days ago
Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images
Active contour methods like snakes, have become a basic tool in computer vision and image analysis over the last years. They have proven to be adequate for the task of finding bou...
Benjamin Seppke, Leonie Dreschler-Fischer, Nathana...
EDBT
2010
ACM
185views Database» more  EDBT 2010»
14 years 12 days ago
BP-Ex: a uniform query engine for business process execution traces
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. Analyzing the execution of such processes is critical for enforcing business ...
Eran Balan, Tova Milo, Tal Sterenzy
ISSTA
2010
ACM
14 years 12 days ago
Exploiting program dependencies for scalable multiple-path symbolic execution
This paper presents a new technique, called Symbolic Program Decomposition (or SPD), for symbolic execution of multiple paths that is more scalable than existing techniques, which...
Raúl A. Santelices, Mary Jean Harrold