Sciweavers

2018 search results - page 55 / 404
» Code Normal Forms
Sort
View
RAID
2001
Springer
14 years 2 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
PSIVT
2009
Springer
116views Multimedia» more  PSIVT 2009»
14 years 4 months ago
Video Coding Using Spatially Varying Transform
In this paper, we propose a novel algorithm, named as Spatially Varying Transform (SVT). The basic idea of SVT is that we do not restrict the transform coding inside normal block b...
Cixun Zhang, Kemal Ugur, Jani Lainema, Moncef Gabb...
DCC
2009
IEEE
14 years 10 months ago
Clustered Reversible-KLT for Progressive Lossy-to-Lossless 3d Image Coding
The RKLT is a lossless approximation to the KLT, and has been recently employed for progressive lossy-to-lossless coding of hyperspectral images. Both yield very good coding perfo...
Ian Blanes, Joan Serra-Sagristà
TVCG
2008
104views more  TVCG 2008»
13 years 9 months ago
A Generic Scheme for Progressive Point Cloud Coding
In this paper, we propose a generic point cloud encoder that provides a unified framework for compressing different attributes of point samples corresponding to 3D objects with an ...
Yan Huang, Jingliang Peng, C. C. Jay Kuo, M. Gopi
ISVC
2007
Springer
14 years 4 months ago
Iris Recognition: An Entropy-Based Coding Strategy Robust to Noisy Imaging Environments
Abstract. The iris is currently accepted as one of the most accurate traits for biometric purposes. However, for the sake of accuracy, iris recognition systems rely on good quality...
Hugo Proença, Luís A. Alexandre