Sciweavers

1245 search results - page 133 / 249
» Binary Sparse Coding
Sort
View
CVIU
2007
113views more  CVIU 2007»
15 years 3 months ago
Primal sketch: Integrating structure and texture
This article proposes a generative image model, which is called ‘‘primal sketch,’’ following Marr’s insight and terminology. This model combines two prominent classes of...
Cheng-en Guo, Song Chun Zhu, Ying Nian Wu
ICDCS
2008
IEEE
15 years 10 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen
ICC
2007
IEEE
152views Communications» more  ICC 2007»
15 years 7 months ago
Characterizing and Exploiting Partial Interference in Wireless Mesh Networks
Abstract-- In evaluating the performance of a wireless network, the interference between wireless links plays a key role. In previous works, interference was assumed to be a binary...
Ka-Hung Hui, Wing Cheong Lau, On-Ching Yue
121
Voted
HOTDEP
2008
107views Hardware» more  HOTDEP 2008»
15 years 5 months ago
Reverse-Engineering Drivers for Safety and Portability
Device drivers today lack two important properties: guaranteed safety and cross-platform portability. We present an approach to incrementally achieving these properties in drivers...
Vitaly Chipounov, George Candea
ASM
2008
ASM
15 years 5 months ago
Using EventB to Create a Virtual Machine Instruction Set Architecture
A Virtual Machine (VM) is a program running on a conventional microprocessor that emulates the binary instruction set, registers, and memory space of an idealized computing machine...
Stephen Wright