Sciweavers

2814 search results - page 548 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
EUROCAST
1997
Springer
156views Hardware» more  EUROCAST 1997»
15 years 8 months ago
A Computational Model for Visual Size, Location and Movement
The ability to detect object size, location and movement is essential for a visual system in either a biological or man made environment. In this paper we present a model for esti...
Miguel Alemán-Flores, K. Nicholas Leibovic,...
270
Voted
VMV
2008
307views Visualization» more  VMV 2008»
15 years 6 months ago
2D Video Editing for 3D Effects
We present a semi-interactive system for advanced video processing and editing. The basic idea is to partially recover planar regions in object space and to exploit this minimal p...
Darko Pavic, Volker Schönefeld, Lars Krecklau...
174
Voted
MVA
2002
178views Computer Vision» more  MVA 2002»
15 years 4 months ago
Advanced Image Retrieval Using Multi-resolution Image Content
We introduce an image retrieval method for searchingan image database by using a query image that has similarity in its global and/or regional image contents to the intended targe...
Motohide Yoshimura, Hajime Kiyose, Shigeo Abe
AICCSA
2006
IEEE
134views Hardware» more  AICCSA 2006»
15 years 10 months ago
The vMatrix: Equi-Ping Game Server Placement For Pre-Arranged First-Person-Shooter Multiplayer Matches
Today most multiplayer game servers are pre-located statically, which makes it hard for gamers to find equi-ping hosts for their matches. This is especially important for first per...
Amr Awadallah, Mendel Rosenblum
DIMVA
2010
15 years 6 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...