Sciweavers

774 search results - page 146 / 155
» Information Integration Using Logical Views
Sort
View
CVPR
2010
IEEE
15 years 11 months ago
Scalable Active Matching
In matching tasks in computer vision, and particularly in real-time tracking from video, there are generally strong priors available on absolute and relative correspondence locati...
Ankur Handa, Margarita Chli, Hauke Strasdat, Andre...
132
Voted
3DGIS
2006
Springer
15 years 8 months ago
3D Geometries in Spatial DBMS
Database management systems (DBMS) have significantly changed in the last several years. From a system dealing with management of administrative data they have involved to a spati...
Sisi Zlatanova
132
Voted
ICISS
2010
Springer
15 years 21 days ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
127
Voted
PLDI
2009
ACM
15 years 9 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
122
Voted
ICCSA
2005
Springer
15 years 8 months ago
Conceptual Modeling of Genetic Studies and Pharmacogenetics
Genetic Studies examine relationships between genetic variation and disease development. Pharmacogenetics studies the responses to drugs against genetic variation. These two lines ...
Xiaohua Zhou, Il-Yeol Song