Sciweavers

15073 search results - page 2822 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
143
Voted
CCS
2005
ACM
15 years 7 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
IUI
2004
ACM
15 years 7 months ago
Evaluating adaptive user profiles for news classification
Never before have so many information sources been available. Most are accessible on-line and some exist on the Internet alone. However, this large information quantity makes inte...
Ricardo Carreira, Jaime M. Crato
MM
2004
ACM
212views Multimedia» more  MM 2004»
15 years 7 months ago
Nonparametric motion model
Motion information is a powerful cue for visual perception. In the context of video indexing and retrieval, motion content serves as a useful source for compact video representati...
Ling-Yu Duan, Min Xu, Qi Tian, Changsheng Xu
UIST
2004
ACM
15 years 7 months ago
Hierarchical parsing and recognition of hand-sketched diagrams
A long standing challenge in pen-based computer interaction is the ability to make sense of informal sketches. A main difficulty lies in reliably extracting and recognizing the i...
Levent Burak Kara, Thomas F. Stahovich
ASM
2004
ASM
15 years 7 months ago
Observations on the Decidability of Transitions
Consider a multiple-agent transition system such that, for some basic types T1, . . . , Tn, the state of any agent can be represented as an element of the Cartesian product T1 ×·...
Yuri Gurevich, Rostislav Yavorskiy
« Prev « First page 2822 / 3015 Last » Next »