Sciweavers

587 search results - page 80 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 4 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
ICIP
2010
IEEE
13 years 8 months ago
Edge-adaptive image segmentation based on seam processing and K-Means clustering
A new image segmentation method is proposed to combine the edge information with the feature-space method, K-Means clustering. A procedure called seam processing, which is computa...
Tse-Wei Chen, Hsiao-Hang Su, Yi-Ling Chen, Shao-Yi...
CRV
2006
IEEE
144views Robotics» more  CRV 2006»
14 years 1 months ago
Building Local Safety Maps for a Wheelchair Robot using Vision and Lasers
To be useful as a mobility assistant for a human driver, an intelligent robotic wheelchair must be able to distinguish between safe and hazardous regions in its immediate environm...
Aniket Murarka, Joseph Modayil, Benjamin Kuipers
ACCV
2009
Springer
14 years 4 months ago
Weighted Map for Reflectance and Shading Separation Using a Single Image
In real world, a scene is composed by many characteristics. Intrinsic images represent these characteristics by two components, reflectance (the albedo of each point) and shading (...
Sung-Hsien Hsieh, Chih-Wei Fang, Te-Hsun Wang, Chi...
CN
2007
137views more  CN 2007»
13 years 10 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....