Sciweavers

2711 search results - page 452 / 543
» Augmented reality: which augmentation for which reality
Sort
View
IJISEC
2006
106views more  IJISEC 2006»
13 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
MMS
2006
13 years 8 months ago
A Generic Agent-based Peer-to-Peer Infrastructure for Social-mobile Applications
: This paper presents a generic agent-based framework for social-mobile applications, which has been developed as part of an ongoing linkage project. The MobiSoft project is driven...
Steffen Kern, Torsten Dettborn, Ronny Eckhaus, Yan...
PR
2006
112views more  PR 2006»
13 years 8 months ago
RBF-based neurodynamic nearest neighbor classification in real pattern space
Superposition of radial basis functions centered at given prototype patterns constitutes one of the most suitable energy forms for gradient systems that perform nearest neighbor c...
Mehmet Kerem Müezzinoglu, Jacek M. Zurada
SP
2008
IEEE
113views Security Privacy» more  SP 2008»
13 years 8 months ago
Inter-operating grids through Delegated MatchMaking
The grid vision of a single computing utility has yet to materialize: while many grids with thousands of processors each exist, most work in isolation. An important obstacle for t...
Alexandru Iosup, Todd Tannenbaum, Matthew Farrelle...
AMC
2005
128views more  AMC 2005»
13 years 8 months ago
A new face recognition method based on SVD perturbation for single example image per person
At present, there are many methods for frontal view face recognition. However, few of them can work well when only one example image per class is available. In this paper, we pres...
Daoqiang Zhang, Songcan Chen, Zhi-Hua Zhou