Sciweavers

3135 search results - page 443 / 627
» Localization Algorithms: Performance Evaluation and Reliabil...
Sort
View
SOSP
2007
ACM
16 years 1 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
138
Voted
VTC
2007
IEEE
183views Communications» more  VTC 2007»
15 years 10 months ago
Multimedia over 802.15.4 and ZigBee Networks for Ambient Environment Control
—WPAN technologies such as IEEE 802.15.4 have been introduced to allow for energy-efficient communication of control and sensor data. In certain application areas, it is benefici...
Ralf Burda, Christian Wietfeld
STOC
2005
ACM
138views Algorithms» more  STOC 2005»
15 years 9 months ago
A new strategy for querying priced information
This paper focuses on competitive function evaluation in the context of computing with priced information. A function f is given together with a cost cx for each variable x of f. ...
Ferdinando Cicalese, Eduardo Sany Laber
162
Voted
SMI
2010
IEEE
173views Image Analysis» more  SMI 2010»
15 years 2 months ago
Point Cloud Skeletons via Laplacian Based Contraction
—We present an algorithm for curve skeleton extraction via Laplacian-based contraction. Our algorithm can be applied to surfaces with boundaries, polygon soups, and point clouds....
Junjie Cao, Andrea Tagliasacchi, Matt Olson, Hao Z...
ACCV
2010
Springer
15 years 6 months ago
Ghost-free High Dynamic Range Imaging
Most high dynamic range image (HDRI) algorithms assume stationary scene for registering multiple images which are taken under different exposure settings. In practice, however, the...
Yong Seok Heo (Seoul National University), Kyoung ...