Sciweavers

4841 search results - page 607 / 969
» On dynamic feature location
Sort
View
ACSAC
2005
IEEE
15 years 6 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
102
Voted
WMASH
2005
ACM
15 years 6 months ago
A multimedia guidebook implementation using a bluetooth wireless information point network
This paper describes the implementation of a Bluetooth Village Guide Book (VGB) scenario for use in the Kelvin Grove Urban Village located in Brisbane, Australia. An Information P...
Matthew D'Souza, Adam Postula, Neil Bergmann, Mont...
103
Voted
MDM
2004
Springer
15 years 6 months ago
Processing Range-Monitoring Queries on Heterogeneous Mobile Objects
We consider in this paper how to leverage heterogeneous mobile computing capability for efficient processing of real-time range-monitoring queries. In our environment, each mobil...
Ying Cai, Kien A. Hua, Guohong Cao
109
Voted
ECCV
2010
Springer
15 years 5 months ago
Geometric Constraints for Human Detection in Aerial Imagery
In this paper, we propose a method for detecting humans in imagery taken from a UAV. This is a challenging problem due to small number of pixels on target, which makes it more di...
SOUPS
2010
ACM
15 years 4 months ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...