Sciweavers

1420 search results - page 237 / 284
» Representation of Graphs by OBDDs
Sort
View
CVPR
2010
IEEE
15 years 9 months ago
Part and Appearance Sharing: Recursive Compositional Models for Multi-View Multi-Object Detection
We propose Recursive Compositional Models (RCMs) for simultaneous multi-view multi-object detection and parsing (e.g. view estimation and determining the positions of the object s...
Leo Zhu, Yuanhao Chen, Antonio Torralba, William F...
EUROSEC
2009
ACM
15 years 8 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 8 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
SASO
2009
IEEE
15 years 8 months ago
Swarming Polyagents Executing Hierarchical Task Networks
Swarming agents often operate in benign geographic topologies that let them explore alternative trajectories with minor variations that the agent dynamics then amplify for improve...
Sven A. Brueckner, Theodore C. Belding, Robert Bis...
LICS
2009
IEEE
15 years 8 months ago
On the Computational Complexity of Verifying One-Counter Processes
—One-counter processes are pushdown systems over a singleton stack alphabet (plus a stack-bottom symbol). We study the complexity of two closely related verification problems ov...
Stefan Göller, Richard Mayr, Anthony Widjaja ...