Sciweavers

1629 search results - page 238 / 326
» Infeasible Code Detection
Sort
View
TRUST
2010
Springer
15 years 4 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
IPPS
2002
IEEE
15 years 4 months ago
Compile/Run-Time Support for Thread Migration
This paper describes a generic mechanism to migrate threads in heterogeneous distributed environments. To maintain high portability and flexibility, thread migration is implement...
Hai Jiang, Vipin Chaudhary
SCIA
2009
Springer
118views Image Analysis» more  SCIA 2009»
15 years 4 months ago
Grouping of Semantically Similar Image Positions
Features from the Scale Invariant Feature Transformation (SIFT) are widely used for matching between spatially or temporally displaced images. Recently a topology on the SIFT featu...
Lutz Priese, Frank Schmitt, Nils Hering
CC
2001
Springer
103views System Software» more  CC 2001»
15 years 4 months ago
Design-Driven Compilation
This paper introduces design-driven compilation, an approach in which the compiler uses design information to drive its analysis and verify that the program conforms to its design....
Radu Rugina, Martin C. Rinard
FGR
2000
IEEE
131views Biometrics» more  FGR 2000»
15 years 4 months ago
Robust Facial Feature Localization by Coupled Features
In this paper, we consider the problem of robust localization of faces and some of their facial features. The task arises e.g. in the medical field of visual analysis of facial p...
Matthias Zobel, Arnd Gebhard, Dietrich Paulus, Joa...