Sciweavers

275 search results - page 37 / 55
» join 2007
Sort
View
107
Voted
DIMVA
2009
15 years 1 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
93
Voted
EJC
2007
15 years 10 days ago
An integrality theorem of root systems
Let Φ be an irreducible root system and ∆ be a base for Φ; it is well known that any root in Φ is an integral combination of the roots in ∆. In comparison to this fact, we ...
A. Bhattacharya, G. R. Vijayakumar
95
Voted
AMC
2005
128views more  AMC 2005»
15 years 9 days ago
A new face recognition method based on SVD perturbation for single example image per person
At present, there are many methods for frontal view face recognition. However, few of them can work well when only one example image per class is available. In this paper, we pres...
Daoqiang Zhang, Songcan Chen, Zhi-Hua Zhou
88
Voted
JDM
2007
56views more  JDM 2007»
15 years 8 days ago
Temporal Aggregation Using a Multidimensional Index
We present a new method for computing temporal aggregation that uses a multidimensional index. The novelty of our method lies in mapping the start time and end time of a temporal ...
Joon-Ho Woo, Byung Suk Lee, Min-Jae Lee, Woong-Kee...
CVPR
2007
IEEE
16 years 2 months ago
Image Classification with Segmentation Graph Kernels
We propose a family of kernels between images, defined as kernels between their respective segmentation graphs. The kernels are based on soft matching of subtree-patterns of the r...
Francis Bach, Zaïd Harchaoui