Sciweavers

2944 search results - page 588 / 589
» Robust Semantic Construction
Sort
View
CCS
2010
ACM
13 years 4 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
CORR
2009
Springer
137views Education» more  CORR 2009»
13 years 4 months ago
Choreographies with Secure Boxes and Compromised Principals
We equip choreography-level session descriptions with a simple abstraction of a security infrastructure. Message components may be enclosed within (possibly nested) "boxes&quo...
Marco Carbone, Joshua D. Guttman
FIMH
2009
Springer
13 years 4 months ago
Discriminative Joint Context for Automatic Landmark Set Detection from a Single Cardiac MR Long Axis Slice
Cardiac magnetic resonance (MR) imaging has advanced to become a powerful diagnostic tool in clinical practice. Automatic detection of anatomic landmarks from MR images is importan...
Xiaoguang Lu, Bogdan Georgescu, Arne Littmann, Edg...
CVPR
2009
IEEE
14 years 1 months ago
Recognizing realistic actions from videos
In this paper, we present a systematic framework for recognizing realistic actions from videos “in the wild.” Such unconstrained videos are abundant in personal collections as...
Jingen Liu, Jiebo Luo, Mubarak Shah
CC
2011
Springer
270views System Software» more  CC 2011»
12 years 9 months ago
Subregion Analysis and Bounds Check Elimination for High Level Arrays
For decades, the design and implementation of arrays in programming languages has reflected a natural tension between productivity and performance. Recently introduced HPCS langua...
Mackale Joyner, Zoran Budimlic, Vivek Sarkar