Sciweavers

8177 search results - page 278 / 1636
» Detecting System Emulators
Sort
View
ACSAC
2004
IEEE
15 years 7 months ago
Detecting Exploit Code Execution in Loadable Kernel Modules
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of kernel memory and I/O space. As a result, kernel-modu...
Haizhi Xu, Wenliang Du, Steve J. Chapin
CISST
2003
181views Hardware» more  CISST 2003»
15 years 4 months ago
Quadrilateral Signboard Detection and Text Extraction
There are numerous rectangular signboards indoors and outdoors. The information contained in them, such as signs and text, is useful for robot navigation. In this paper, a system ...
Angela Tam, Hua Shen, Jianzhuang Liu, Xiaoou Tang
TIT
1998
93views more  TIT 1998»
15 years 2 months ago
Multihead Detection for Multitrack Recording Channels
— We look at multiple-track detection for magnetic recording systems that use array heads to write and read over multiple tracks simultaneously. The recording channel is modeled ...
Emina Soljanin, Costas N. Georghiades
108
Voted
ICIP
2010
IEEE
15 years 1 months ago
Face-TLD: Tracking-Learning-Detection applied to faces
A novel system for long-term tracking of a human face in unconstrained videos is built on Tracking-Learning-Detection (TLD) approach. The system extends TLD with the concept of a ...
Zdenek Kalal, Krystian Mikolajczyk, Jiri Matas
PAMI
2012
13 years 5 months ago
Tracking-Learning-Detection
A novel system for long-term tracking of a human face in unconstrained videos is built on Tracking-Learning-Detection (TLD) approach. The system extends TLD with the concept of a ...
Zdenek Kalal, Krystian Mikolajczyk, Jiri Matas