Results 1 - 10
of
4,246
Markov Random Field Models in Computer Vision
, 1994
"... . A variety of computer vision problems can be optimally posed as Bayesian labeling in which the solution of a problem is defined as the maximum a posteriori (MAP) probability estimate of the true labeling. The posterior probability is usually derived from a prior model and a likelihood model. The l ..."
Abstract
-
Cited by 516 (18 self)
- Add to MetaCart
. The latter relates to how data is observed and is problem domain dependent. The former depends on how various prior constraints are expressed. Markov Random Field Models (MRF) theory is a tool to encode contextual constraints into the prior probability. This paper presents a unified approach for MRF modeling
Sonification of Sound: Tools for teaching acoustics and audio
- in Proceedings of the 13th International Conference on Auditory Display
, 2007
"... This paper describes a collection of examples of how the teaching of acoustics and technical audio may be aided through sonification. Examples are fixed demonstrations, small programs in Max/MSP, and sonifications as part of a sound analysis program (PsySound3) developed by the authors. Examples inc ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
This paper describes a collection of examples of how the teaching of acoustics and technical audio may be aided through sonification. Examples are fixed demonstrations, small programs in Max/MSP, and sonifications as part of a sound analysis program (PsySound3) developed by the authors. Examples
From controller to sound: tools for collaborative development of digital musical instruments
- IN: PROCEEDINGS OF THE INTERNATIONAL COMPUTER MUSIC CONFERENCE
, 2007
"... This paper describes the design and implementation of a system for collaborative development of a digital musical instrument mapping layer. System development included the design of a decentralized network for the management of peer-to-peer data connections using Open Sound Control. A graphical user ..."
Abstract
-
Cited by 17 (4 self)
- Add to MetaCart
This paper describes the design and implementation of a system for collaborative development of a digital musical instrument mapping layer. System development included the design of a decentralized network for the management of peer-to-peer data connections using Open Sound Control. A graphical
MEMORAX, a precise and sound tool for automatic fence insertion under TSO?
"... Abstract. We introduce MEMORAX, a tool for the verification of control state reachability (i.e., safety properties) of concurrent programs manipulating finite range and integer variables and running on top of weak memory models. The verification task is non-trivial as it involves exploring state spa ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Abstract. We introduce MEMORAX, a tool for the verification of control state reachability (i.e., safety properties) of concurrent programs manipulating finite range and integer variables and running on top of weak memory models. The verification task is non-trivial as it involves exploring state
The synchronous languages 12 years later
- PROCEEDINGS OF THE IEEE
, 2003
"... Twelve years ago, PROCEEDINGS OF THE IEEE devoted a special section to the synchronous languages. This paper discusses the improvements, difficulties, and successes that have occured with the synchronous languages since then. Today, synchronous languages have been established as a technology of choi ..."
Abstract
-
Cited by 191 (28 self)
- Add to MetaCart
of choice for modeling, specifying, validating, and implementing real-time embedded applications. The paradigm of synchrony has emerged as an engineerfriendly design method based on mathematically sound tools.
Sound and Precise Analysis of Web Applications for Injection Vulnerabilities
- PLDI'07
, 2007
"... Web applications are popular targets of security attacks. One common type of such attacks is SQL injection, where an attacker exploits faulty application code to execute maliciously crafted database queries. Both static and dynamic approaches have been proposed to detect or prevent SQL injections; w ..."
Abstract
-
Cited by 161 (5 self)
- Add to MetaCart
by proposing a precise, sound, and fully automated analysis technique for SQL injection. Our technique avoids the need for specifications by considering as attacks those queries for which user input changes the intended syntactic structure of the generated query. It checks conformance to this policy
MOPS: an Infrastructure for Examining Security Properties of Software
- In Proceedings of the 9th ACM Conference on Computer and Communications Security
, 2002
"... We describe a formal approach for finding bugs in security-relevant software and verifying their absence. The idea is as follows: we identify rules of safe programming practice, encode them as safety properties, and verify whether these properties are obeyed. Because manual verification is too expen ..."
Abstract
-
Cited by 233 (8 self)
- Add to MetaCart
expensive, we have built a program analysis tool to automate this process. Our program analysis models the program to be verified as a pushdown automaton, represents the security property as a finite state automaton, and uses model checking techniques to identify whether any state violating the desired
Securing Web Application Code by Static Analysis and Runtime Protection
, 2004
"... Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabilities has been attributed to Web application bugs. Many verification tools are discovering previously unknown vulnerabili ..."
Abstract
-
Cited by 234 (2 self)
- Add to MetaCart
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabilities has been attributed to Web application bugs. Many verification tools are discovering previously unknown
The synchronous languages twelve years later
- PROCEEDINGS OF THE IEEE
, 2003
"... Twelve years ago, Proceedings of the IEEE devoted a special section to the synchronous languages. This article discusses the improvements, difficulties, and successes that have occured with the synchronous languages since then. Today, synchronous languages have been established as a technology of c ..."
Abstract
-
Cited by 155 (11 self)
- Add to MetaCart
of choice for modeling, specifying, validating, and implementing real-time embedded applications. The paradigm of synchrony has emerged as an engineer-friendly design method based on mathematically-sound tools.
Strategies for Sound Internet Measurement
- IMC'04
, 2004
"... Conducting an Internet measurement study in a sound fashion can be much more difficult than it might first appear. We present a number of strategies drawn from experiences for avoiding or overcoming some of the pitfalls. In particular, we discuss dealing with errors and inaccuracies; the importance ..."
Abstract
-
Cited by 95 (3 self)
- Add to MetaCart
publicly available. We conclude with thoughts on the sorts of tools and community practices that can assist researchers with conducting sound measurement studies.
Results 1 - 10
of
4,246