Sciweavers

587 search results - page 72 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
ECCV
2004
Springer
15 years 4 days ago
Separating Transparent Layers through Layer Information Exchange
In this paper we present an approach for separating two transparent layers in images and video sequences. Given two initial unknown physical mixtures, I1 and I2, of real scene laye...
Bernard Sarel, Michal Irani
PLDI
2010
ACM
14 years 7 months ago
Pacer: Proportional Detection of Data Races
Data races indicate serious concurrency bugs such as order, atomicity, and sequential consistency violations. Races are difficult to find and fix, often manifesting only in deploy...
Michael D. Bond, Katherine E. Coons, Kathryn S. Mc...
CODASPY
2012
12 years 6 months ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
CCS
2011
ACM
12 years 10 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
PRESENCE
2007
119views more  PRESENCE 2007»
13 years 9 months ago
Gaze-Contingent Visual Presentation Based on Remote Saccade Detection
Pursuing new display techniques based on insights into human visual perception can reveal new possibilities for visual information devices. Here, we propose a novel information pr...
Junji Watanabe, Hideyuki Ando, Taro Maeda, Susumu ...