Sciweavers

1316 search results - page 182 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
WWW
2010
ACM
14 years 3 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
BTW
2009
Springer
146views Database» more  BTW 2009»
14 years 3 months ago
Towards Flash Disk Use in Databases - Keeping Performance While Saving Energy?
Abstract: Green computing or energy saving when processing information is primarily considered a task of processor development. We, however, advocate that a holistic approach is ne...
Theo Härder, Karsten Schmidt 0002, Yi Ou, Seb...
CVPR
2007
IEEE
14 years 3 months ago
Multiple Target Tracking Using Spatio-Temporal Markov Chain Monte Carlo Data Association
We propose a framework for general multiple target tracking, where the input is a set of candidate regions in each frame, as obtained from a state of the art background learning, ...
Qian Yu, Gérard G. Medioni, Isaac Cohen
HUMO
2007
Springer
14 years 3 months ago
Multi Person Tracking Within Crowded Scenes
This paper presents a solution to the problem of tracking people within crowded scenes. The aim is to maintain individual object identity through a crowded scene which contains com...
Andrew Gilbert, Richard Bowden
MIR
2006
ACM
178views Multimedia» more  MIR 2006»
14 years 2 months ago
Dual diffusion model of spreading activation for content-based image retrieval
This paper introduces a content-based information retrieval method inspired by the ideas of spreading activation models. In response to a given query, the proposed approach comput...
Serhiy Kosinov, Stéphane Marchand-Maillet, ...