Sciweavers

18716 search results - page 3578 / 3744
» Automatic
Sort
View
146
Voted
UAI
2004
15 years 4 months ago
Recovering Articulated Object Models from 3D Range Data
We address the problem of unsupervised learning of complex articulated object models from 3D range data. We describe an algorithm whose input is a set of meshes corresponding to d...
Dragomir Anguelov, Daphne Koller, Hoi-Cheung Pang,...
107
Voted
USS
2004
15 years 4 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
USS
2004
15 years 4 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
147
Voted
USS
2004
15 years 4 months ago
Avfs: An On-Access Anti-Virus File System
Viruses and other malicious programs are an everincreasing threat to current computer systems. They can cause serious damage and consume countless hours of system administrators&#...
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wrigh...
124
Voted
INTERACT
2003
15 years 4 months ago
Godzilla: Seamless 2D and 3D Sketch Environment for Reflective and Creative Design Work
The rapid development of information technology has enabled many systems that support creative work. However, it has gradually become obvious that the latest information systems h...
Shun'ichi Tano, T. Kodera, T. Nakashima, I. Kawano...
« Prev « First page 3578 / 3744 Last » Next »