Sciweavers

1109 search results - page 169 / 222
» Towards an analysis of dynamic environments
Sort
View
ACSC
2006
IEEE
15 years 4 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
SECON
2010
IEEE
14 years 8 months ago
Traffic Inference in Anonymous MANETs
Abstract--The open wireless medium in a mobile ad-hoc network (MANET) enables malicious traffic analysis to dynamically infer the network traffic pattern in hostile environments. T...
Yunzhong Liu, Rui Zhang, Jing Shi, Yanchao Zhang
MM
2005
ACM
187views Multimedia» more  MM 2005»
15 years 3 months ago
Augmented segmentation and visualization for presentation videos
We investigate methods of segmenting, visualizing, and indexing presentation videos by both audio and visual data. The audio track is segmented by speaker, and augmented with key ...
Alexander Haubold, John R. Kender
SCIA
2007
Springer
124views Image Analysis» more  SCIA 2007»
15 years 4 months ago
Novel Stereoscopic View Generation by Image-Based Rendering Coordinated with Depth Information
Abstract. This paper describes a method of stereoscopic view generation by image-based rendering in wide outdoor environments. The stereoscopic view can be generated from an omnidi...
Maiya Hori, Masayuki Kanbara, Naokazu Yokoya
WSC
1997
14 years 11 months ago
A Performance Monitoring Application for Distributed Interactive Simulations (DIS)
This paper discusses the design, development, and use of a performance monitoring tool for Distributed Interactive Simulations (DIS). A typical DIS environment consists of hundred...
David B. Cavitt, C. Michael Overstreet, Kurt Maly