Sciweavers

1170 search results - page 210 / 234
» How Fast Is Too Fast
Sort
View
106
Voted
CCS
2007
ACM
15 years 7 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
120
Voted
ISVC
2007
Springer
15 years 7 months ago
Gradient-Based Hand Tracking Using Silhouette Data
Optical motion capture can be classified as an inference problem: given the data produced by a set of cameras, the aim is to extract the hidden state, which in this case encodes t...
Paris Kaimakis, Joan Lasenby
109
Voted
TAMC
2007
Springer
15 years 7 months ago
Approximation Algorithms for 3D Orthogonal Knapsack
We study non-overlapping axis-parallel packings of 3D boxes with profits into a dedicated bigger box where rotation is either forbidden or permitted; we wish to maximize the total...
Florian Diedrich, Rolf Harren, Klaus Jansen, Ralf ...
91
Voted
ICDM
2006
IEEE
91views Data Mining» more  ICDM 2006»
15 years 7 months ago
Entropy-based Concept Shift Detection
When monitoring sensory data (e.g., from a wearable device) the context oftentimes changes abruptly: people move from one situation (e.g., working quietly in their office) to ano...
Peter Vorburger, Abraham Bernstein
88
Voted
ICMCS
2006
IEEE
139views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Carriage of 3D Audio-Visual Services by T-DMB
In this paper, we introduce our experience on the development of a three-dimensional audio-visual(3D AV) service system based on the terrestrial digital multimedia broadcasting (T...
Sukhee Cho, Namho Hur, Jinwoong Kim, Kugjin Yun, S...