Sciweavers

587 search results - page 72 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
105
Voted
ECCV
2004
Springer
16 years 2 months ago
Separating Transparent Layers through Layer Information Exchange
In this paper we present an approach for separating two transparent layers in images and video sequences. Given two initial unknown physical mixtures, I1 and I2, of real scene laye...
Bernard Sarel, Michal Irani
138
Voted
PLDI
2010
ACM
15 years 10 months ago
Pacer: Proportional Detection of Data Races
Data races indicate serious concurrency bugs such as order, atomicity, and sequential consistency violations. Races are difficult to find and fix, often manifesting only in deploy...
Michael D. Bond, Katherine E. Coons, Kathryn S. Mc...
161
Voted
CODASPY
2012
13 years 8 months ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
102
Voted
CCS
2011
ACM
14 years 16 days ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
94
Voted
PRESENCE
2007
119views more  PRESENCE 2007»
15 years 1 days ago
Gaze-Contingent Visual Presentation Based on Remote Saccade Detection
Pursuing new display techniques based on insights into human visual perception can reveal new possibilities for visual information devices. Here, we propose a novel information pr...
Junji Watanabe, Hideyuki Ando, Taro Maeda, Susumu ...