Sciweavers

7167 search results - page 1421 / 1434
» A Technique for Invariant Generation
Sort
View
TVCG
2010
126views more  TVCG 2010»
14 years 8 months ago
Modeling Repetitive Motions Using Structured Light
— Obtaining models of dynamic 3D objects is an important part of content generation for computer graphics. Numerous methods have been extended from static scenarios to model dyna...
Yi Xu, Daniel G. Aliaga
VTC
2010
IEEE
113views Communications» more  VTC 2010»
14 years 8 months ago
Multi-Level Turbo Decoding Assisted Soft Combining Aided Hybrid ARQ
—1 Hybrid Automatic Repeat reQuest (ARQ) plays an essential role in error control. Combining the incorrectly received packet replicas in hybrid ARQ has been shown to reduce the r...
Hong Chen, Robert G. Maunder, Lajos Hanzo
ACL
2010
14 years 7 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
ACSAC
2010
IEEE
14 years 7 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
ACSAC
2010
IEEE
14 years 7 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu
« Prev « First page 1421 / 1434 Last » Next »