Sciweavers

3207 search results - page 492 / 642
» A Semantics for HTN Methods
Sort
View
VIROLOGY
2010
179views more  VIROLOGY 2010»
15 years 3 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
ICCV
2009
IEEE
1042views Computer Vision» more  ICCV 2009»
16 years 10 months ago
Activity Recognition using the velocity histories of tracked keypoints
We present an activity recognition feature inspired by human psychophysical performance. This feature is based on the velocity history of tracked keypoints. We present a generat...
Ross Messing, Chris Pal, Henry Kautz
ICDE
2007
IEEE
146views Database» more  ICDE 2007»
16 years 6 months ago
Conditional Functional Dependencies for Data Cleaning
We propose a class of constraints, referred to as conditional functional dependencies (CFDs), and study their applications in data cleaning. In contrast to traditional functional ...
Philip Bohannon, Wenfei Fan, Floris Geerts, Xibei ...
ICDE
2000
IEEE
125views Database» more  ICDE 2000»
16 years 6 months ago
An Algebraic Compression Framework for Query Results
Decision-support applications in emerging environments require that SQL query results or intermediate results be shipped to clients for further analysis and presentation. These cl...
Zhiyuan Chen, Praveen Seshadri
ICPR
2006
IEEE
16 years 6 months ago
Adaptive Discriminant Projection for Content-based Image Retrieval
Content-based Image Retrieval (CBIR) is a computer vision application that aims at automatically retrieving images based on their visual content. Linear Discriminat Analysis and i...
Jie Yu, Qi Tian