Sciweavers

2902 search results - page 199 / 581
» Simple Local Models for Complex Dynamical Systems
Sort
View
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
IJCV
2007
113views more  IJCV 2007»
15 years 4 months ago
Vision and Rain
The visual effects of rain are complex. Rain produces sharp intensity changes in images and videos that can severely impair the performance of outdoor vision systems. In this paper...
Kshitiz Garg, Shree K. Nayar
ICIP
2006
IEEE
16 years 6 months ago
An adaptive mixture color model for robust visual tracking
Global color characterization is a very powerful tool to model in a simple yet discriminant way the visual appearance of complex objects. A fixed reference model of this type can ...
Antoine Lehuger, Patrick Léchat, Patrick P&...
ICFP
2007
ACM
16 years 4 months ago
Faster laziness using dynamic pointer tagging
In the light of evidence that Haskell programs compiled by GHC exhibit large numbers of mispredicted branches on modern processors, we re-examine the "tagless" aspect of...
Simon Marlow, Alexey Rodriguez Yakushev, Simon L. ...
CCGRID
2004
IEEE
15 years 8 months ago
When can an autonomous reputation scheme discourage free-riding in a peer-to-peer system?
We investigate the circumstances under which it is possible to discourage free-riding in a peer-to-peer system for resource-sharing by prioritizing resource allocation to peers wi...
Nazareno Andrade, Miranda Mowbray, Walfredo Cirne,...