Sciweavers

1345 search results - page 187 / 269
» Reliable dissolve detection
Sort
View
CORR
2010
Springer
79views Education» more  CORR 2010»
14 years 10 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
ACSAC
2010
IEEE
14 years 6 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
HUC
2011
Springer
13 years 9 months ago
LightWave: using compact fluorescent lights as sensors
In this paper, we describe LightWave, a sensing approach that turns ordinary compact fluorescent light (CFL) bulbs into sensors of human proximity. Unmodified CFL bulbs are shown ...
Sidhant Gupta, Ke-Yu Chen, Matthew S. Reynolds, Sh...
ICCV
2007
IEEE
15 years 11 months ago
Shape Descriptors for Maximally Stable Extremal Regions
This paper introduces an affine invariant shape descriptor for maximally stable extremal regions (MSER). Affine invariant feature descriptors are normally computed by sampling the...
David G. Lowe, Per-Erik Forssén
ECCV
1998
Springer
15 years 11 months ago
Multi-Step Procedures for the Localization of 2D and 3D Point Landmarks and Automatic ROI Size Selection
In this contribution, we are concerned with the detection and re ned localization of 3D point landmarks. We propose multi-step di erential procedures for subvoxel localization of 3...
Sönke Frantz, Karl Rohr, H. Siegfried Stiehl