Sciweavers

738 search results - page 101 / 148
» Cache modeling in probabilistic execution time analysis
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 19 days ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
CORR
2008
Springer
131views Education» more  CORR 2008»
13 years 8 months ago
Towards a More Accurate Carrier Sensing Model for CSMA Wireless Networks
Abstract--In the majority of studies on CSMA wireless networks, a contention graph is used to model the carrier sensing relationships among links. This is a 0-1 model in which two ...
Caihong Kai, Soung Chang Liew
IVC
2010
95views more  IVC 2010»
13 years 7 months ago
Monocular head pose estimation using generalized adaptive view-based appearance model
Accurately estimating the person’s head position and orientation is an important task for a wide range of applications such as driver awareness, meeting analysis and human-robot...
Louis-Philippe Morency, Jacob Whitehill, Javier R....
PADS
1999
ACM
14 years 1 months ago
Shock Resistant Time Warp
In an attempt to cope with time-varying workload, traditional adaptive Time Warp protocols are designed to react in response to performance changes by altering control parameter c...
Alois Ferscha, James Johnson
CVIU
2007
108views more  CVIU 2007»
13 years 8 months ago
A real-time hand tracker using variable-length Markov models of behaviour
We present a novel approach for visual tracking of structured behaviour as observed in human–computer interaction. An automatically acquired variable-length Markov model is used...
Nikolay Stefanov, Aphrodite Galata, Roger J. Hubbo...