Sciweavers

8177 search results - page 1450 / 1636
» Detecting System Emulators
Sort
View
KI
2005
Springer
15 years 9 months ago
Heuristic-Based Laser Scan Matching for Outdoor 6D SLAM
6D SLAM (Simultaneous Localization and Mapping) or 6D Concurrent Localization and Mapping of mobile robots considers six dimensions for the robot pose, namely, the x, y and z coord...
Andreas Nüchter, Kai Lingemann, Joachim Hertz...
PCI
2005
Springer
15 years 9 months ago
Protein Classification with Multiple Algorithms
Nowadays, the number of protein sequences being stored in central protein databases from labs all over the world is constantly increasing. From these proteins only a fraction has b...
Sotiris Diplaris, Grigorios Tsoumakas, Pericles A....
ACII
2005
Springer
15 years 9 months ago
Sketch Based Facial Expression Recognition Using Graphics Hardware
In this paper, a novel system is proposed to recognize facial expression based on face sketch, which is produced by programmable graphics hardware-GPU(Graphics Processing Unit). Fi...
Jiajun Bu, Mingli Song, Qi Wu, Chun Chen, Cheng Ji...
128
Voted
CC
2005
Springer
153views System Software» more  CC 2005»
15 years 9 months ago
Completeness Analysis for Incomplete Object-Oriented Programs
We introduce a new approach, called completeness analysis, to computing points-to sets for incomplete Java programs such as library modules or applications in the presence of dynam...
Jingling Xue, Phung Hua Nguyen
ACMSE
2004
ACM
15 years 9 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
« Prev « First page 1450 / 1636 Last » Next »