Sciweavers

398 search results - page 45 / 80
» Automatic Trace-Based Performance Analysis of Metacomputing ...
Sort
View
WIAMIS
2009
IEEE
15 years 4 months ago
Graph-based approach for 3D object duplicate detection
In this paper, we consider the challenging problem of object duplicate detection and localization. Several applications require efficient object duplicate detection methods, such ...
Peter Vajda, Frédéric Dufaux, Thien ...
ICDM
2008
IEEE
118views Data Mining» more  ICDM 2008»
15 years 4 months ago
Dirichlet Process Based Evolutionary Clustering
Evolutionary Clustering has emerged as an important research topic in recent literature of data mining, and solutions to this problem have found a wide spectrum of applications, p...
Tianbing Xu, Zhongfei (Mark) Zhang, Philip S. Yu, ...
ACSAC
2006
IEEE
15 years 3 months ago
Static Detection of Vulnerabilities in x86 Executables
In the last few years, several approaches have been proposed to perform vulnerability analysis of applications written in high-level languages. However, little has been done to au...
Marco Cova, Viktoria Felmetsger, Greg Banks, Giova...
PR
2007
192views more  PR 2007»
14 years 9 months ago
Face detection with boosted Gaussian features
Detecting faces in images is a key step in numerous computer vision applications, such as face recognition or facial expression analysis. Automatic face detection is a difficult ...
Julien Meynet, Vlad Popovici, Jean-Philippe Thiran
PLDI
2004
ACM
15 years 3 months ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam