Sciweavers

3074 search results - page 596 / 615
» A Boundary-Fragment-Model for Object Detection
Sort
View
NDSS
2007
IEEE
14 years 3 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
ISCAS
2006
IEEE
133views Hardware» more  ISCAS 2006»
14 years 3 months ago
A psychiatric patients tracking system
This paper presents an RFID based psychiatric critical to psychiatric patient treatment. The work oftracking patient tracking system in a psychiatric patient care center. In psychi...
Ming-Hua Tsai, Chieh-Ling Huang, Pau-Choo Chung, Y...
CONCUR
2005
Springer
14 years 3 months ago
Concurrent Clustered Programming
d Abstract) Vijay Saraswat1 and Radha Jagadeesan2 1 IBM T.J. Watson Research Lab 2 School of CTI, DePaul University Abstract. We present the concurrency and distribution primitives...
Vijay A. Saraswat, Radha Jagadeesan
NPAR
2004
ACM
14 years 3 months ago
Hardware-determined feature edges
Algorithms that detect silhouettes, creases, and other edge based features often perform per-edge and per-face mesh computations using global adjacency information. These are unsu...
Morgan McGuire, John F. Hughes
WECWIS
2003
IEEE
132views ECommerce» more  WECWIS 2003»
14 years 2 months ago
Page Digest for Large-Scale Web Services
The rapid growth of the World Wide Web and the Internet has fueled interest in Web services and the Semantic Web, which are quickly becoming important parts of modern electronic c...
Daniel Rocco, David Buttler, Ling Liu