Sciweavers

2596 search results - page 368 / 520
» Classes and clusters in data analysis
Sort
View
163
Voted
OSDI
2006
ACM
16 years 4 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
ETRA
2000
ACM
199views Biometrics» more  ETRA 2000»
15 years 8 months ago
Identifying fixations and saccades in eye-tracking protocols
The process of fixation identification--separating and labeling fixations and saccades in eye-tracking protocols--is an essential part of eye-movement data analysis and can have a...
Dario D. Salvucci, Joseph H. Goldberg
SUM
2010
Springer
15 years 2 months ago
Event Modelling and Reasoning with Uncertain Information for Distributed Sensor Networks
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Jianbing Ma, Weiru Liu, Paul Miller
ICCV
2009
IEEE
16 years 9 months ago
Automatic annotation of human actions in video
This paper addresses the problem of automatic temporal annotation of realistic human actions in video using mini- mal manual supervision. To this end we consider two asso- ciate...
Olivier Duchenne, Ivan Laptev, Josef Sivic, Franci...
ICDE
2006
IEEE
136views Database» more  ICDE 2006»
16 years 6 months ago
XCluster Synopses for Structured XML Content
We tackle the difficult problem of summarizing the path/branching structure and value content of an XML database that comprises both numeric and textual values. We introduce a nov...
Neoklis Polyzotis, Minos N. Garofalakis