Sciweavers

2117 search results - page 411 / 424
» A Metadata Model for Capturing Presentations
Sort
View
IISWC
2009
IEEE
15 years 6 months ago
On the (dis)similarity of transactional memory workloads
— Programming to exploit the resources in a multicore system remains a major obstacle for both computer and software engineers. Transactional memory offers an attractive alternat...
Clay Hughes, James Poe, Amer Qouneh, Tao Li
ISMAR
2009
IEEE
15 years 6 months ago
Dynamic seethroughs: Synthesizing hidden views of moving objects
This paper presents a method to create an illusion of seeing moving objects through occluding surfaces in a video. This illusion is achieved by transferring information from a cam...
Peter Barnum, Yaser Sheikh, Ankur Datta, Takeo Kan...
DEXA
2009
Springer
151views Database» more  DEXA 2009»
15 years 6 months ago
Automatic Extraction of Ontologies Wrapping Relational Data Sources
Describing relational data sources (i.e. databases) by means of ontologies constitutes the foundation of most of the semantic based approaches to data access and integration. In sp...
Lina Lubyte, Sergio Tessaris
123
Voted
ISVC
2009
Springer
15 years 6 months ago
Motion-Based View-Invariant Articulated Motion Detection and Pose Estimation Using Sparse Point Features
Abstract. We present an approach for articulated motion detection and pose estimation that uses only motion information. To estimate the pose and viewpoint we introduce a novel mot...
Shrinivas J. Pundlik, Stanley T. Birchfield
NDSS
2007
IEEE
15 years 6 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...