Sciweavers

625 search results - page 125 / 125
» Improved Phishing Detection using Model-Based Features
Sort
View
PLDI
2006
ACM
13 years 10 months ago
Optimizing memory transactions
Atomic blocks allow programmers to delimit sections of code as ‘atomic’, leaving the language’s implementation to enforce atomicity. Existing work has shown how to implement...
Timothy L. Harris, Mark Plesko, Avraham Shinnar, D...
ICMI
2004
Springer
215views Biometrics» more  ICMI 2004»
13 years 10 months ago
Bimodal HCI-related affect recognition
Perhaps the most fundamental application of affective computing would be Human-Computer Interaction (HCI) in which the computer is able to detect and track the user’s affective ...
Zhihong Zeng, Jilin Tu, Ming Liu, Tong Zhang, Nich...
PLDI
2003
ACM
13 years 10 months ago
Linear analysis and optimization of stream programs
As more complex DSP algorithms are realized in practice, an increasing need for high-level stream abstractions that can be compiled without sacrificing efficiency. Toward this en...
Andrew A. Lamb, William Thies, Saman P. Amarasingh...
IJPP
2002
107views more  IJPP 2002»
13 years 4 months ago
Efficiently Adapting Java Binaries in Limited Memory Contexts
This paper presents a compilation framework that allows executable code to be shared across different Java Virtual Machine (JVM) instances. All fully compliant JVMs that target se...
Pramod G. Joisha, Samuel P. Midkiff, Mauricio J. S...
CGF
2011
12 years 8 months ago
Intrinsic Shape Matching by Planned Landmark Sampling
Recently, the problem of intrinsic shape matching has received a lot of attention. A number of algorithms have been proposed, among which random-sampling-based techniques have bee...
Art Tevs, Alexander Berner, Michael Wand, Ivo Ihrk...