Sciweavers

1636 search results - page 306 / 328
» Detecting similar software applications
Sort
View
VRST
2009
ACM
15 years 8 months ago
Standalone edge-based markerless tracking of fully 3-dimensional objects for handheld augmented reality
This paper presents a markerless tracking technique targeted to the Windows Mobile Pocket PC platform. The primary aim of this work is to allow the development of standalone augme...
João Paulo S. M. Lima, Veronica Teichrieb, ...
NDSS
2008
IEEE
15 years 8 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
PPOPP
2006
ACM
15 years 7 months ago
Exploiting distributed version concurrency in a transactional memory cluster
We investigate a transactional memory runtime system providing scaling and strong consistency for generic C++ and SQL applications on commodity clusters. We introduce a novel page...
Kaloian Manassiev, Madalin Mihailescu, Cristiana A...
UIST
2005
ACM
15 years 7 months ago
eyeLook: using attention to facilitate mobile media consumption
One of the problems with mobile media devices is that they may distract users during critical everyday tasks, such as navigating the streets of a busy city. We addressed this issu...
Connor Dickie, Roel Vertegaal, Changuk Sohn, Danie...
PLDI
2010
ACM
15 years 7 months ago
Finding low-utility data structures
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is especially true in highly layered Java applications. Often at the heart of these misse...
Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas ...