Sciweavers

4520 search results - page 872 / 904
» Algebraic Techniques for Timed Systems
Sort
View
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 6 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
EUROSYS
2008
ACM
14 years 8 months ago
Towards cinematic internet video-on-demand
Video-on-demand (VoD) is increasingly popular with Internet users. It gives users greater choice and more control than live streaming or file downloading. Systems such as MSN Vid...
Bin Cheng, Lex Stein, Hai Jin, Zheng Zhang
BMCBI
2008
129views more  BMCBI 2008»
13 years 11 months ago
EMAAS: An extensible grid-based Rich Internet Application for microarray data analysis and management
Background: Microarray experimentation requires the application of complex analysis methods as well as the use of non-trivial computer technologies to manage the resultant large d...
Geraint Barton, J. C. Abbott, Norie Chiba, D. W. H...
SI3D
1999
ACM
14 years 3 months ago
UniCam - 2D gestural camera controls for 3D environments
We present a novel approach to controlling a virtual 3D camera with a 2D mouse or stylus input device that is based on gestural interaction. Our approach to 3D camera manipulation...
Robert C. Zeleznik, Andrew S. Forsberg
CVPR
2003
IEEE
15 years 29 days ago
Shedding Light on the Weather
Virtually all methods in image processing and computer vision, for removing weather effects from images, assume single scattering of light by particles in the atmosphere. In reali...
Srinivasa G. Narasimhan, Shree K. Nayar