Sciweavers

979 search results - page 93 / 196
» Event Detection in Pedestrian Detection and Tracking Applica...
Sort
View
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
14 years 9 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
CVPR
2010
IEEE
15 years 2 months ago
Motion Fields to Predict Play Evolution in Dynamic Sport Scenes
Videos of multi-player team sports provide a challenging domain for dynamic scene analysis. Player actions and interactions are complex as they are driven by many factors, such as...
Kihwan Kim, Matthias Grundmann, Ariel Shamir, Iain...
PLDI
1998
ACM
15 years 2 months ago
A Study of Dead Data Members in C++ Applications
Object-oriented applications may contain data members that can be removed from the application without a ecting program behavior. Such \dead" data members may occur due to un...
Peter F. Sweeney, Frank Tip
ISMAR
2003
IEEE
15 years 3 months ago
Fully Automated and Stable Registration for Augmented Reality Applications
We present a fully automated approach to camera registration for Augmented Reality systems. It relies on purely passive vision techniques to solve the initialization and realtime ...
Vincent Lepetit, Luca Vacchetti, Daniel Thalmann, ...
DATE
2008
IEEE
100views Hardware» more  DATE 2008»
15 years 4 months ago
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...