Sciweavers

1123 search results - page 174 / 225
» Analysis of Timed Processes with Data Using Algebraic Transf...
Sort
View
CCS
2010
ACM
13 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
DAGM
2006
Springer
14 years 18 days ago
On-Line, Incremental Learning of a Robust Active Shape Model
Abstract. Active Shape Models are commonly used to recognize and locate different aspects of known rigid objects. However, they require an off-line learning stage, such that the ex...
Michael Fussenegger, Peter M. Roth, Horst Bischof,...
3DPVT
2006
IEEE
247views Visualization» more  3DPVT 2006»
14 years 20 days ago
Contour-Based Object Detection in Range Images
This paper presents a novel object recognition approach based on range images. Due to its insensitivity to illumination, range data is well suited for reliable silhouette extracti...
Stefan Stiene, Kai Lingemann, Andreas Nüchter...
ICIP
2005
IEEE
14 years 10 months ago
Fusion of multiple viewpoint information towards 3D face robust orientation detection
This paper presents a novel approach to the problem of determining head pose estimation and face 3D orientation of several people in low resolution sequences from multiple calibra...
Cristian Canton-Ferrer, Josep R. Casas, Montse Par...
PASTE
1999
ACM
14 years 1 months ago
Identifying Procedural Structure in Cobol Programs
The principal control-flow abstraction mechanism in the Cobol language is the PERFORM statement. Normally, PERFORM statements are used in a straightforward manner to define para...
John Field, G. Ramalingam