Sciweavers

1548 search results - page 280 / 310
» Estimating Software Vulnerabilities
Sort
View
TDSC
2010
172views more  TDSC 2010»
14 years 4 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
ICASSP
2011
IEEE
14 years 1 months ago
Stretching, compression and shearing disparity compensated prediction techniques for stereo and multiview video coding
- In multiview video coding, disparity compensated prediction exploits the correlation among different views. A common approach is to use the conventional motion compensated predic...
Ka-Man Wong, Lai-Man Po, Kwok-Wai Cheung, Ka-Ho Ng...
205
Voted
FGR
2011
IEEE
384views Biometrics» more  FGR 2011»
14 years 1 months ago
The computer expression recognition toolbox (CERT)
— We present the Computer Expression Recognition Toolbox (CERT), a software tool for fully automatic real-time facial expression recognition, and officially release it for free ...
Gwen Littlewort, Jacob Whitehill, Tingfan Wu, Ian ...
98
Voted
DSN
2011
IEEE
13 years 9 months ago
Resource and virtualization costs up in the cloud: Models and design choices
—Virtualization offers the potential for cost-effective service provisioning. For service providers who make significant investments in new virtualized data centers in support of...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova
90
Voted
ADCM
1998
132views more  ADCM 1998»
14 years 9 months ago
Numerical solution of generalized Lyapunov equations
Two e cient methods for solving generalized Lyapunov equations and their implementations in FORTRAN 77 are presented. The rst one is a generalization of the Bartels{Stewart method...
Thilo Penzl