Sciweavers

2834 search results - page 512 / 567
» A Probabilistic Approach to Measuring Robustness in Computin...
Sort
View
CVPR
2009
IEEE
14 years 1 months ago
Catadioptric Projectors
We present a catadioptric projector analogous to a catadioptric camera by combining a commodity digital projector with additional optical units. We show that, by using specially sh...
Yuanyuan Ding, Jing Xiao, Kar-Han Tan, Jingyi Yu
ACSAC
2006
IEEE
14 years 1 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
CDC
2009
IEEE
147views Control Systems» more  CDC 2009»
14 years 15 days ago
A simulation-based method for aggregating Markov chains
— This paper addresses model reduction for a Markov chain on a large state space. A simulation-based framework is introduced to perform state aggregation of the Markov chain base...
Kun Deng, Prashant G. Mehta, Sean P. Meyn
APGV
2010
ACM
247views Visualization» more  APGV 2010»
13 years 11 months ago
Perception of linear and nonlinear motion properties using a FACS validated 3D facial model
In this paper we present the first Facial Action Coding System (FACS) valid model to be based on dynamic 3D scans of human faces for use in graphics and psychological research. T...
Darren Cosker, Eva Krumhuber, Adrian Hilton
SEC
2004
13 years 9 months ago
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
Abstract--Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an antistack-smashing defense technique for Microsoft Wind...
Danny Nebenzahl, Avishai Wool