Sciweavers

979 search results - page 141 / 196
» Event Detection in Pedestrian Detection and Tracking Applica...
Sort
View
SOSP
2009
ACM
15 years 6 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
IJISEC
2006
106views more  IJISEC 2006»
14 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
BMCBI
2006
130views more  BMCBI 2006»
14 years 9 months ago
Laboratory Information Management Software for genotyping workflows: applications in high throughput crop genotyping
Background: With the advances in DNA sequencer-based technologies, it has become possible to automate several steps of the genotyping process leading to increased throughput. To e...
B. Jayashree, Praveen T. Reddy, Y. Leeladevi, Jona...
CVPR
2008
IEEE
15 years 4 months ago
Visual quasi-periodicity
Periodicity is at the core of the recognition of many actions. This paper takes the following steps to detect and measure periodicity. 1) We establish a conceptual framework of cl...
Erik Pogalin, Arnold W. M. Smeulders, Andrew H. C....
GECCO
2008
Springer
144views Optimization» more  GECCO 2008»
14 years 10 months ago
Multi-resistant radar jamming using genetic algorithms
The next generation of advanced self-protection jammers is expected to deliver effective and energy efficient jamming against modern air tracking radars. However, optimizing such ...
Hans Jonas Fossum Moen, Stein Kristoffersen