Sciweavers

756 search results - page 66 / 152
» Recent progress with BOXES
Sort
View
CCS
2011
ACM
13 years 10 months ago
The power of procrastination: detection and mitigation of execution-stalling malicious code
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react p...
Clemens Kolbitsch, Engin Kirda, Christopher Kruege...
ANTS
2006
Springer
73views Algorithms» more  ANTS 2006»
15 years 1 months ago
The Elliptic Curve Database for Conductors to 130000
Abstract. Tabulating elliptic curves has been carried out since the earliest days of machine computation in number theory. After some historical remarks, we report on significant r...
John Cremona
CVPR
2008
IEEE
15 years 12 months ago
Spatio-temporal Saliency detection using phase spectrum of quaternion fourier transform
Salient areas in natural scenes are generally regarded as the candidates of attention focus in human eyes, which is the key stage in object detection. In computer vision, many mod...
Chenlei Guo, Qi Ma, Liming Zhang
ICIP
2001
IEEE
15 years 11 months ago
Adaptive video background modeling using color and depth
Copyright 2001 IEEE. Published in the 2001 International Conference on Image Processing (ICIP-2001), October 7-10, 2001, Thessaloniki, Greece. Personal use of this material is per...
Gaile G. Gordon, John Woodfill, Michael Harville
STOC
2006
ACM
108views Algorithms» more  STOC 2006»
15 years 10 months ago
Extractors for a constant number of polynomially small min-entropy independent sources
We consider the problem of randomness extraction from independent sources. We construct an extractor that can extract from a constant number of independent sources of length n, ea...
Anup Rao