Sciweavers

6769 search results - page 1256 / 1354
» A new concept of robustness
Sort
View
NDSS
2000
IEEE
14 years 12 days ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
SIGGRAPH
1997
ACM
14 years 11 days ago
Object shape and reflectance modeling from observation
An object model for computer graphics applications should contain two aspects of information: shape and reflectance properties of the object. A number of techniques have been deve...
Yoichi Sato, Mark D. Wheeler, Katsushi Ikeuchi
SIGGRAPH
1995
ACM
14 years 11 days ago
Intelligent scissors for image composition
We present a new, interactive tool called Intelligent Scissors which we use for image segmentation and composition. Fully automated segmentation is an unsolved problem, while manu...
Eric N. Mortensen, William A. Barrett
SIGMOD
1995
ACM
116views Database» more  SIGMOD 1995»
14 years 11 days ago
Incremental Maintenance of Views with Duplicates
We study the problem of e cient maintenance of materialized views that may contain duplicates. This problem is particularly important when queries against such views involve aggre...
Timothy Griffin, Leonid Libkin
ACCV
2010
Springer
13 years 11 months ago
Ghost-free High Dynamic Range Imaging
Most high dynamic range image (HDRI) algorithms assume stationary scene for registering multiple images which are taken under different exposure settings. In practice, however, the...
Yong Seok Heo (Seoul National University), Kyoung ...
« Prev « First page 1256 / 1354 Last » Next »