Sciweavers

1050 search results - page 164 / 210
» A Trainable System for Object Detection
Sort
View
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 16 days ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
SOSP
2009
ACM
15 years 6 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
ICPR
2008
IEEE
15 years 4 months ago
Automatic geo-registration of maritime video feeds
We propose an automatic method to geo-register maritime video feeds to satellite images. The method first detects horizon during the day time and apex during the night time for si...
Xiaochun Cao, Zeeshan Rasheed, Haiying Liu, Niels ...
ISCAS
2008
IEEE
138views Hardware» more  ISCAS 2008»
15 years 4 months ago
High-speed adaptive RF phased array
— We demonstrate dynamic power maximization and synchronization of a wireless RF communication link through adaptation of the radiation pattern of a phased array at the transmitt...
Dimitrios N. Loizos, Paul-Peter Sotiriadis, Gert C...
MMSEC
2005
ACM
274views Multimedia» more  MMSEC 2005»
15 years 3 months ago
LSB steganalysis based on high-order statistics
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
Sorina Dumitrescu, Xiaolin Wu