Sciweavers

5863 search results - page 1087 / 1173
» An evaluation of the TRIPS computer system
Sort
View
CCS
2010
ACM
14 years 8 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
ICDE
2011
IEEE
281views Database» more  ICDE 2011»
14 years 1 months ago
Declarative analysis of noisy information networks
—There is a growing interest in methods for analyzing data describing networks of all types, including information, biological, physical, and social networks. Typically the data ...
Walaa Eldin Moustafa, Galileo Namata, Amol Deshpan...
POPL
2011
ACM
14 years 21 days ago
Safe nondeterminism in a deterministic-by-default parallel language
A number of deterministic parallel programming models with strong safety guarantees are emerging, but similar support for nondeterministic algorithms, such as branch and bound sea...
Robert L. Bocchino Jr., Stephen Heumann, Nima Hona...
CVPR
2009
IEEE
16 years 5 months ago
Learning To Detect Unseen Object Classes by Between-Class Attribute Transfer
We study the problem of object classification when training and test classes are disjoint, i.e. no training examples of the target classes are available. This setup has hardly be...
Christoph H. Lampert, Hannes Nickisch, Stefan Harm...
ICCV
2009
IEEE
16 years 2 months ago
Static Multi-Camera Factorization Using Rigid Motion
Camera networks have gained increased importance in recent years. Previous approaches mostly used point correspondences between different camera views to calibrate such systems....
Roland Angst, Marc Pollefeys
« Prev « First page 1087 / 1173 Last » Next »