Sciweavers

2421 search results - page 319 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
160
Voted
AR
2005
92views more  AR 2005»
15 years 4 months ago
Efficient model-based tracking for robot vision
This paper proposes a real-time, robust and efficient three-dimensional (3D) model-based tracking algorithm. A virtual visual servoing approach is used for monocular 3D tracking. T...
Andrew I. Comport, Éric Marchand, Fran&cced...
ECOOP
2008
Springer
15 years 6 months ago
A Uniform Transactional Execution Environment for Java
Abstract. Transactional memory (TM) has recently emerged as an effective tool for extracting fine-grain parallelism from declarative critical sections. In order to make STM systems...
Lukasz Ziarek, Adam Welc, Ali-Reza Adl-Tabatabai, ...
CCS
2007
ACM
15 years 9 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
16 years 5 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
GECCO
2004
Springer
164views Optimization» more  GECCO 2004»
15 years 10 months ago
Fuzzy Dominance Based Multi-objective GA-Simplex Hybrid Algorithms Applied to Gene Network Models
Hybrid algorithms that combine genetic algorithms with the Nelder-Mead simplex algorithm have been effective in solving certain optimization problems. In this article, we apply a s...
Praveen Koduru, Sanjoy Das, Stephen Welch, Judith ...