Sciweavers

2694 search results - page 455 / 539
» A Description Logic of Change
Sort
View
ICISS
2010
Springer
13 years 7 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
CVPR
2008
IEEE
14 years 11 months ago
Matching images under unstable segmentations
Region based features are getting popular due to their higher descriptive power relative to other features. However, real world images exhibit changes in image segments capturing ...
Varsha Hedau, Himanshu Arora, Narendra Ahuja
MICCAI
2003
Springer
14 years 10 months ago
Caudate Shape Discrimination in Schizophrenia Using Template-Free Non-parametric Tests
This paper describes shape analysis of the caudate nucleus structure in a large schizophrenia study (30 controls, 60 schizophrenics). Although analysis of the caudate has not drawn...
Y. Sampath K. Vetsa, Martin Styner, Stephen M. Piz...
KDD
2009
ACM
187views Data Mining» more  KDD 2009»
14 years 10 months ago
New ensemble methods for evolving data streams
Advanced analysis of data streams is quickly becoming a key area of data mining research as the number of applications demanding such processing increases. Online mining when such...
Albert Bifet, Bernhard Pfahringer, Geoffrey Holmes...
ICCAD
2006
IEEE
141views Hardware» more  ICCAD 2006»
14 years 6 months ago
A code refinement methodology for performance-improved synthesis from C
Although many recent advances have been made in hardware synthesis techniques from software programming languages such as C, the performance of synthesized hardware commonly suffe...
Greg Stitt, Frank Vahid, Walid A. Najjar