Sciweavers

438 search results - page 29 / 88
» The forest hiding problem
Sort
View
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 6 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
GECCO
2004
Springer
211views Optimization» more  GECCO 2004»
15 years 5 months ago
Node-Depth Encoding for Evolutionary Algorithms Applied to Network Design
Network design involves several areas of engineering and science. Computer networks, electrical circuits, transportation problems, and phylogenetic trees are some examples. In gene...
Alexandre C. B. Delbem, André Carlos Ponce ...
CVPR
2010
IEEE
1135views Computer Vision» more  CVPR 2010»
15 years 7 months ago
Towards Weakly Supervised Semantic Segmentation by Means of Multiple Instance and Multitask Learning.
We address the task of learning a semantic segmentation from weakly supervised data. Our aim is to devise a system that predicts an object label for each pixel by making use of on...
Alexander Vezhnevets, Joachim Buhmann
SIBGRAPI
2007
IEEE
15 years 6 months ago
Seed-Relative Segmentation Robustness of Watershed and Fuzzy Connectedness Approaches
This paper analyzes the robustness issue in three segmentation approaches: the iterative relative fuzzy object extraction, the watershed transforms (WT) by image foresting transfo...
Romaric Audigier, Roberto de Alencar Lotufo
ICRA
2005
IEEE
102views Robotics» more  ICRA 2005»
15 years 5 months ago
Planning 3-D Path Networks in Unstructured Environments
Abstract— In this paper, we explore the problem of threedimensional motion planning in highly cluttered and unstructured outdoor environments. Because accurate sensing and modeli...
Nicolas Vandapel, James Kuffner, Omead Amidi