Sciweavers

5948 search results - page 1018 / 1190
» Computing Robust Counter-Strategies
Sort
View
115
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
155
Voted
AMFG
2005
IEEE
218views Biometrics» more  AMFG 2005»
15 years 9 months ago
Online Feature Selection Using Mutual Information for Real-Time Multi-view Object Tracking
It has been shown that features can be selected adaptively for object tracking in changing environments [1]. We propose to use the variance of Mutual Information [2] for online fea...
Alex Po Leung, Shaogang Gong
119
Voted
CIG
2005
IEEE
15 years 9 months ago
A Generic Approach for Generating Interesting Interactive Pac-Man Opponents
This paper follows on from our previous work focused on formulating an efficient generic measure of user’s satisfaction (‘interest’) when playing predator/prey games. Viewin...
Georgios N. Yannakakis, John Hallam
133
Voted
CODES
2005
IEEE
15 years 9 months ago
Rappit: framework for synthesis of host-assisted scripting engines for adaptive embedded systems
Scripting is a powerful, high-level, cross-platform, dynamic, easy way of composing software modules as black boxes. Unfortunately, the high runtime overhead has prevented scripti...
Jiwon Hahn, Qiang Xie, Pai H. Chou
126
Voted
COLCOM
2005
IEEE
15 years 9 months ago
On-demand overlay networking of collaborative applications
We propose a new overlay network, called Generic Identifier Network (GIN), for collaborative nodes to share objects with transactions across affiliated organizations by merging th...
Cheng-Jia Lai, Richard R. Muntz
« Prev « First page 1018 / 1190 Last » Next »