Sciweavers

2236 search results - page 446 / 448
» Intrusion detection techniques and approaches
Sort
View
TOG
2008
239views more  TOG 2008»
13 years 5 months ago
Skeleton extraction by mesh contraction
eleton is a very useful 1D structure to abstract the geometry and topology of a 3D object. Extraction of curve-skeletons is a fundamental problem in computer graphics, visualizatio...
Oscar Kin-Chung Au, Chiew-Lan Tai, Hung-Kuo Chu, D...
JFP
2000
163views more  JFP 2000»
13 years 5 months ago
Automatic useless-code elimination for HOT functional programs
In this paper we present two type inference systems for detecting useless-code in higher-order typed functional programs. Type inference can be performed in an efficient and compl...
Ferruccio Damiani, Paola Giannini
IJPP
2002
107views more  IJPP 2002»
13 years 5 months ago
Efficiently Adapting Java Binaries in Limited Memory Contexts
This paper presents a compilation framework that allows executable code to be shared across different Java Virtual Machine (JVM) instances. All fully compliant JVMs that target se...
Pramod G. Joisha, Samuel P. Midkiff, Mauricio J. S...
PERVASIVE
2008
Springer
13 years 5 months ago
Pressing the Flesh: Sensing Multiple Touch and Finger Pressure on Arbitrary Surfaces
Abstract. This paper identifies a new physical correlate of finger pressure that can be detected and measured visually in a wide variety of situations. When a human finger is press...
Joe Marshall, Tony P. Pridmore, Mike Pound, Steve ...
ICRA
2010
IEEE
178views Robotics» more  ICRA 2010»
13 years 4 months ago
Autonomous operation of novel elevators for robot navigation
— Although robot navigation in indoor environments has achieved great success, robots are unable to fully navigate these spaces without the ability to operate elevators, includin...
Ellen Klingbeil, Blake Carpenter, Olga Russakovsky...